Preview

Unit 4 Assignment 4

Satisfactory Essays
Open Document
Open Document
340 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 4 Assignment 4
Unit 4 Assignment 4.3
Implementation of a Data Classification Policy
Risk Assessment
One the first steps in implementing an effective security plan is to periodically assess Organizational risks. Identifying and mitigating risk will help in establishing a security management structure and assigning security responsibilities. Without having an understanding of your risk you are unable to determine the proper security policies, procedures, guidelines, and standards to put in place to ensure adequate security controls are implemented. The risk assessment provides a baseline for implementing security plans to protect assets against threats. Within the risk assessment some basic questions must be answered, What assets within the organization need protection, What are the risks to each of these assets, How much time, effort, and money is the organization willing to spend to upgrade or obtain new adequate protection against these threats?
Developing an Effective Organization-wide Access Control Plan
Because the management of security groups, ACLs, and security settings need to be careful planned, and creating an access control plan that could assist in preventing standard security problems from occurring. Standard security problems that want to prevent from occurring are: Inefficiently protecting network resources and assigning users too much rights and permissions, or too little rights and permissions to perform their daily tasks, or continuously performing ad hoc security configurations to correct security settings. Access control plan will include, Security Strategies: This component will outline general security strategies that deals with all possible threats identified as security risks. Permissions will be given to different users according to their position in the Organization, and security groups should be defined so permissions can be implemented effectively. Security policies: Will determine the configuration settings implement for the Security Settings of

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 5 Assignment 2

    • 1305 Words
    • 4 Pages

    1. Which of the following types of LANs was a competitor of Ethernet LANs from the earliest days of wired LANs in the 1980s and into the 1990s? c. Token Ring…

    • 1305 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 4 Assignment 4

    • 122 Words
    • 1 Page

    A private network schema is a viable choice for internal IP addressing. Each office can have its own range to avoid conflicts with other locations if subnetted correctly. Assuming that all nodes and servers have only one interface, you should only need one public address per outward interface. In the diagram provided, you would only need one public IP address for the router connection to the Internet. Everything else can be addressed privately with the correct subnetting.…

    • 122 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Unit 3 assignment 1

    • 479 Words
    • 2 Pages

    The purpose of this policy is to define standards for connecting to Richman Investments network from any host. These standards are designed to minimize the potential exposure to Richman Investments from damages which may result from unauthorized use of Richman Investments resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical Richman Investments internal systems, etc.…

    • 479 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Unit 8 Assignment 2

    • 1088 Words
    • 3 Pages

    Centralization sums up my primary reason for implementing Active Directory. The Active Directory structure makes it possible for you to achieve truly centralized management of users, regardless of how big your client’s network has become. If you've worked with Windows NT before, you know that in Windows NT a domain is a completely independent entity. While it's possible to create a trust relationship between domains that exist on a common network, the domains are never truly integrated with each other because there is no higher authority that manages the domains.…

    • 1088 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Unit 3 Assignment 1

    • 375 Words
    • 2 Pages

    1. Research the following organizations and explain their involvement with the Internet public IP addresses:…

    • 375 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    unit 3 assignment 4

    • 4187 Words
    • 14 Pages

    It is not only individuals in the consumer marketplace that have the potential to buy, as buyers also exist in the business to business market. B2B markets are individuals that have the responsibility of purchasing on behalf of the business. Cadbury have both individual and business to business consumers. They trade with all major supermarkets and superstores, but also sell to local and private shops. This way they can broaden their distribution and reach customers and consumers everywhere.…

    • 4187 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    unit 3 assignment 3

    • 854 Words
    • 3 Pages

    1. Which of the following is true about a TCP/IP network? A) The network uses only standards defined in TCP/IP RFCs.…

    • 854 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unit 4 assignment 2

    • 303 Words
    • 2 Pages

    After research and careful consideration of some of the other policies listed by other companies such as AT&T, Sprint, T-Mobile, and Verizon Wireless, Richman Investments has come up with the an acceptable use policy (AUP).…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Assignment 1

    • 253 Words
    • 2 Pages

    3) Why would this affect child labor-Why is the labor force utilizing children-shouldn’t they be in school…

    • 253 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Assignment 2

    • 257 Words
    • 2 Pages

    1. The five vulnerabilities that exist for this LAN based workgroup are 2755801, 2501696, 2588513 2639658, 2659883.…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unit 7 assignment 4

    • 836 Words
    • 4 Pages

    having a family history of CHD – the risk is increased if you have a male relative with CHD under 55 or a female relative under 65…

    • 836 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    Unit 4 Assignment 1

    • 2295 Words
    • 10 Pages

    - Updating knowledge: They use information to update their knowledge on things like what products are selling the most and which ones have high demand, they can then make sure that they supply all of these products for the customers, they can find this out by questionnaires etc. and also written sales figures and this will update their knowledge on what products are their best sellers so they can promote these.…

    • 2295 Words
    • 10 Pages
    Better Essays
  • Good Essays

    SkillPort Security

    • 647 Words
    • 3 Pages

    Having the proper security measures is very critical when running a business. It can be very expensive for an organization to keep an updated security system but in the end, it is well worth the money. No manager should want to even take the risk of letting hackers or viruses into the organizations information system. To fully understand why it is critical to have security measures, you first need to understand the different threats a network can face. Having a good secure network can prevent things such as malware, social engineering attacks, spam, and phishing. All of these can be very dangerous and damaging to your network. As a manager it is also very important to have a thorough security policy that states the precautions and also the steps to take in case of a security breach. When choosing security controls for your business you must consider three things; what security controls does your business need to safeguard the information systems, the safety and protection that security controls should provide, and existing security controls and how they have been implemented.…

    • 647 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 4 Assignment 2

    • 1005 Words
    • 5 Pages

    Conducting actions irrelevant to their work, such as playing games, listening to music, watch videos, and etc.…

    • 1005 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Security Manager Role

    • 1762 Words
    • 8 Pages

    Security takes into account all actions and objectives intended to meet asset safeguard goals to make certain that security problems do not occur. Management of security is defined as multifaceted and interdisciplinary. Security for an organization includes the use of criminal and civil law, inspections, sleuthing, profiling, business management, strategy proposals, psychology, sociology, and technology to shield persons and property. A security manager’s role varies, according to the organizational structure. A security manager takes on managerial, administrative, preventative, and investigative responsibilities and functions.…

    • 1762 Words
    • 8 Pages
    Powerful Essays