Preview

Select One of the Company Profiles Below to Be Used for Your Information Security Policy

Satisfactory Essays
Open Document
Open Document
375 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Select One of the Company Profiles Below to Be Used for Your Information Security Policy
* Select one of the company profiles below to be used for your Information Security Policy

1) Company 1: The Bloom Design Group is a company that offers interior design services to businesses and individuals throughout the world. Bloom has a corporate office in New York and a second office in Los Angeles. The company’s website features a virtual decorating tool, which offers clients the chance to play with different color and design schemes. This tool allows their clients to get an idea of what a design project would look like once it is completed, before actually making color and design decisions. The website also gives interior designers access to their client files and company style guides, as well as create the ability to electronically process orders for design materials and furniture. The designers use a secure login and a password to gain access to the website and its features. The company's workforce spends all its time working remotely and accessing the corporate network using a secure VPN.

2) Company 2: Sunica Music and Movies is a local multimedia chain with four locations. Each store has been acting independently of one another and has difficulty coordinating customer sales from one store to another based on inventory. Because of poor communications, revenue and customer base have been lost due to jumbled inventory from store to store, decentralized accounting, and no Internet-based commerce. With the successful implementation of a WAN solution, all stores will have the ability to access a centralized database for inventory and dynamically reorder stock based on sales. Each location will tunnel all financial transactions through a central accounting package, eliminating bookkeeping errors, and centralizing the company finances. All transactions and customer inventory browsing will be done through a web interface and custom intranet website. To meet their need for an Internet customer base, web servers will be located in their data

You May Also Find These Documents Helpful

  • Better Essays

    INDP Kudler Fine Food

    • 1189 Words
    • 4 Pages

    1. All three stores networks are built around a 100 base T environment. Install a Wide area networks (WANs), which might take the form of a company’s head office linked to the other two facilities and additional new stores spanning several states,…

    • 1189 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Best Essays

    The Kudler Fine Foods organization is comprised currently of three locations and their goal includes connecting all their locales so they can easily transfer and analyze human resource and customer data, while combining all their finest resources. In order to accomplish this, Kudler Fine Foods will need to purchase equipment, to include routers, modems, computers and security software to protect the network. It will also be necessary to implement this new system, using the most up to date methods and techniques, so they can streamline all their current collaboration methods.…

    • 2802 Words
    • 8 Pages
    Best Essays
  • Good Essays

    Netw410 Week2

    • 716 Words
    • 3 Pages

    The actual business goals for this project is to offer new and better services and support, open the network to key constituents, build relationships and information accessibility to a new level, as a basis for the network organizational model, avoid business disruption caused by network security problems, avoid business disruption caused by natural and unnatural disaster, modernize outdated technologies and reduce telecommunications and network costs, including overhead associated with separate networks for voice, data and video.…

    • 716 Words
    • 3 Pages
    Good Essays
  • Good Essays

    It 244 Week 1 Checkpoint

    • 721 Words
    • 3 Pages

    The company I have chosen is The Bloom Design Group. The Bloom Design Groups mission is to provide online interior design services to its customers. The company offers their customers interior design services. What sets this company apart from others is that they have a website that allows customers a chance to design and decorate their rooms to their liking in a virtual environment before spending their money. The option provided for their customers is a virtual decorating tool. With this tool customers can play around with various color schemes for each room’s floor and ceilings, as well as customizing furniture as well. Then employees are able to access the corporate network through a VPN collection to access their client files, in order to place electronic orders for the design materials and furniture.…

    • 721 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    • Complete the Network Security Policy and Executive Summary portions of the Information Security Policy.…

    • 470 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Sunica Music

    • 697 Words
    • 3 Pages

    Sunica Music and Movies is a small but growing multimedia chain with currently four locations. These locations currently act independently from each other and have little to no communication between each other and each other’s stock. There is no web site which limits the business to local and word of mouth. There is also an accounting issue due to no centralization of funds. Because of these issues the company has lost customers and revenue. With the implementation of a Wide Area Network (WAN), and proper security steps, Sunica Music and Movies will have the ability to access, implement and use a centralized inventory database from any store. The creation of a webpage will also be necessary to be the company global as well as create an intranet between stores for secure location to location data transfer. There will need to be site set ups, one for the primary location of the web servers and data centralization and a backup location for disaster recovery.…

    • 697 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Select one of the company profiles below to be used for your Information Security Policy…

    • 396 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT 240 Week 1

    • 317 Words
    • 1 Page

    3) If the company is set up with multiple locations in different cities I would set up a WAN if the company is set up as a single location then I would recommend a LAN set up. In a client/server environment a client such as a laptop is connected to a server that stores information and files on it. The client, such as a laptop, connects to a server to access the information on that server.…

    • 317 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    The User Domain will enforce an acceptable use policy (AUP) to define what each user can and cannot do with any company data shall he or she have access to it. As well as with company users, any outside contractor or third-party representatives shall also need to agree and comply with the AUP. All users must be properly identified and sign this AUP prior to gaining any access whatsoever to the company network. No exceptions. Any violation will be taken up with company executives and/or the authorities to assess further punitive action.…

    • 471 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    It 244 Ap C

    • 466 Words
    • 2 Pages

    Sunica Music and Movies suffers from a lack of a centralized framework for their stores. Each store works as an individual without the knowledge of the other four. This company is in need of a centralized intranet for employees and an internet portal for those customers wishing to shop from home or peruse their services and merchandise.…

    • 466 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Hard Rock Case Study

    • 275 Words
    • 2 Pages

    2. Build a central data warehouse and inventory management system and a uniform accounting system…

    • 275 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Unit 5 Assignment 1

    • 1355 Words
    • 6 Pages

    * To protect all information assets from unauthorized access, use, modification, disclosure, destruction or interference;…

    • 1355 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    The company proposed a new way to distribute content over the Internet. The reason why this technology is invented is a real problem related to the Internet. The main problem is that existing routing systems on the Internet are not able to serve new needs of consumers. Consumers moved to more sophisticated multi-media applications and routing system became overloaded. It resulted with delays in the system and slowness of the web in peak periods.…

    • 1796 Words
    • 8 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The internet allows organizations to connect with the general public through open traffic that can be accessed through addresses or searches using key words. An organization can utilize a variety of opportunities which include everything from basic information to retail software. Automatically updating information on a user’s system is also possible. There are many examples of online retail operations on the internet…

    • 314 Words
    • 2 Pages
    Satisfactory Essays