SlideShare a Scribd company logo
1 of 8
Discussion
Post an article review (minimum of 200 words) related to email,
instant messaging, or web components.
Case study
Prepare a two page paper on the following:
How would you implement a successful spam-filtering policy.
You may use the internet for more information. Please double
space your papers and cite your sources.
Key words
Select ten key terms from chapter 16 and ten key terms from
chapter 17 and type the definitions of each.
Chapter 16
· AOL Instant Messenger (AIM)
· Botnet
· DomainKeys Identified Mail (DKIM)
· E-mail
· E-mail hoax
· Encryption
· Instant messaging (IM)
· Mail delivery agent (MDA)
· Mail relaying
· Mail transfer agent (MTA)
Chapter 17
· JavaScript
· Lightweight Directory Access Protocol (LDAP)
· PHP
· Plug-in
· Secure Sockets Layer (SSL)
· Server-side scripting
· SSL stripping attack
· Transport Layer Security (TLS)
· Uniform Resource Locator (URL)
· X.500
Create a Policy for the CMMC Framework
Writing a policy is an essential task for any security
professional
to know how to generate, update, build, and follow. The below
framework for a policy is broken down into eight parts.
1. Overview
o State the overview of what this policy covers.
2. Purpose
o State why this policy exists and its purpose
3. Scope
o Who and what does this apply to?
4. Policy
o The policy itself.
o Guidelines
o Rules for having the policy
5. Policy Compliance
o How will it be verified that the policy is being meet?
6. Related Standards, Policies, and Processes
o If any
7. Definitions and Terms
o If any
8. Revision History
o The date and summary of what changed since the last
edit.
Consensus Policy Resource Community
Password Protection Policy
Free Use Disclaimer: This policy was created by or for the
SANS Institute for the
Internet community. All or parts of this policy can be freely
used for your organization.
There is no prior approval required. If you would like to
contribute a new policy or
updated version of this policy, please send email to
[email protected]
Last Update Status: Updated October, 2017
1. Overview
Passwords are an important aspect of computer security. A
poorly chosen password may result
in unauthorized access and/or exploitation of our resources. Al l
staff, including contractors and
vendors with access to <Company Name> systems, are
responsible for taking the appropriate
steps, as outlined below, to select and secure their passwords.
2. Purpose
The purpose of this policy is to establish a standard for creation
of strong passwords and the
protection of those passwords.
3. Scope
The scope of this policy includes all personnel who have or are
responsible for an account (or
any form of access that supports or requires a password) on any
system that resides at any
<Company Name> facility, has access to the <Company Name>
network, or stores any non-
public <Company Name> information.
4. Policy
4.1 Password Creation
4.1.1 All user-level and system-level passwords must conform
to the Password Construction
Guidelines.
4.1.2 Users must use a separate, unique password for each of
their work related accounts.
Users may not use any work related passwords for their own,
personal accounts.
4.1.3 User accounts that have system-level privileges granted
through group memberships or
programs such as sudo must have a unique password from all
other accounts held by that
user to access system-level privileges. In addition, it is highly
recommend that some
form of multi-factor authentication is used for any privileged
accounts
4.2 Password Change
4.2.1 Passwords should be changed only when there is reason to
believe a password has been
compromised.
4.2.2 Password cracking or guessing may be performed on a
periodic or random basis by the
Infosec Team or its delegates. If a password is guessed or
cracked during one of these
scans, the user will be required to change it to be in compliance
with the Password
Construction Guidelines.
Consensus Policy Resource Community
4.3 Password Protection
4.3.1 Passwords must not be shared with anyone, including
supervisors and coworkers. All
passwords are to be treated as sensitive, Confidential <Company
Name> information.
Corporate Information Security recognizes that legacy
applications do not support proxy
systems in place. Please refer to the technical reference for
additional details.
4.3.2 Passwords must not be inserted into email messages,
Alliance cases or other forms of
electronic communication, nor revealed over the phone to
anyone.
4.3.3 Passwords may be stored only in “password managers”
authorized by the organization.
4.3.4 Do not use the "Remember Password" feature of
applications (for example, web
browsers).
4.3.5 Any user suspecting that his/her password may have been
compromised must report the
incident and change all passwords.
4.4 Application Development
Application developers must ensure that their programs contain
the following security
precautions:
4.4.1 Applications must support authentication of individual
users, not groups.
4.4.2 Applications must not store passwords in clear text or in
any easily reversible form.
4.4.3 Applications must not transmit passwords in clear text
over the network.
4.4.4 Applications must provide for some sort of role
management, such that one user can take
over the functions of another without having to know the other's
password.
4.5 Multi-Factor Authentication
4.5.1 Multi-factor authentication is highly encouraged and
should be used whenever possible,
not only for work related accounts but personal accounts also.
5. Policy Compliance
5.1 Compliance Measurement
The Infosec team will verify compliance to this policy through
various methods, including but
not limited to, periodic walk-throughs, video monitori ng,
business tool reports, internal and
external audits, and feedback to the policy owner.
5.2 Exceptions
Any exception to the policy must be approved by the Infosec
Team in advance.
5.3 Non-Compliance
An employee found to have violated this policy may be subject
to disciplinary action, up to and
including termination of employment.
Consensus Policy Resource Community
6 Related Standards, Policies and Processes
• Password Construction Guidelines
7 Revision History
Date of Change Responsible Summary of Change
June 2014 SANS Policy Team Updated and converted to new
format.
October, 2017 SANS Policy Team Updated to confirm with new
NIST SP800-63.3
standards.
Helpful Links
• SANS Security Policy Templates main page
• SANS Password Policy Document
• Password Construction Guidelines – SANS Example
• NIST 800-100 Information Security Handbook: A Guide for
Managers
• Internet DMZ Equipment Policy-
• Virtual Private Network (VPN) Policy
• Web Application Security Policy

More Related Content

Similar to Implement a Successful Spam Filtering Policy

Consensus policy resource community remote access polic
Consensus policy resource community remote access policConsensus policy resource community remote access polic
Consensus policy resource community remote access policARIV4
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxwkyra78
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxrtodd599
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxjeffsrosalyn
 
A software engineer designs, develop, tests, and evaluates the sof.docx
A software engineer designs, develop, tests, and evaluates the sof.docxA software engineer designs, develop, tests, and evaluates the sof.docx
A software engineer designs, develop, tests, and evaluates the sof.docxdaniahendric
 
System security by Amin Pathan
System security by Amin PathanSystem security by Amin Pathan
System security by Amin Pathanaminpathan11
 
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docxSample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docxtodd331
 
4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx
4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx
4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docxalinainglis
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowNuuko, Inc.
 
To meet the requirements for lab 10 you were to perform Part 1, S
To meet the requirements for lab 10 you were to perform Part 1, STo meet the requirements for lab 10 you were to perform Part 1, S
To meet the requirements for lab 10 you were to perform Part 1, STakishaPeck109
 
HIPAA Safeguard Slides
HIPAA Safeguard SlidesHIPAA Safeguard Slides
HIPAA Safeguard Slidesprojectwinner
 
3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment Questionnaire3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment QuestionnairePriyanka Aash
 
Authentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_webAuthentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_webSafeNet
 
Mitre ATTACK and the North Korean Regime-Backed Programmer
Mitre ATTACK and the North Korean Regime-Backed ProgrammerMitre ATTACK and the North Korean Regime-Backed Programmer
Mitre ATTACK and the North Korean Regime-Backed ProgrammerDigital Shadows
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-PracticesOctogence
 
8 must dos for a perfect privileged account management strategy
8 must dos for a perfect privileged account management strategy8 must dos for a perfect privileged account management strategy
8 must dos for a perfect privileged account management strategyManageEngine
 
Securing Your Servers Top 5 Essential Practices.pdf
Securing Your Servers Top 5 Essential Practices.pdfSecuring Your Servers Top 5 Essential Practices.pdf
Securing Your Servers Top 5 Essential Practices.pdfHarrySmith401833
 
Scenario Overview Now that you’re super knowledgeable about se.docx
Scenario Overview Now that you’re super knowledgeable about se.docxScenario Overview Now that you’re super knowledgeable about se.docx
Scenario Overview Now that you’re super knowledgeable about se.docxtodd331
 

Similar to Implement a Successful Spam Filtering Policy (20)

Consensus policy resource community remote access polic
Consensus policy resource community remote access policConsensus policy resource community remote access polic
Consensus policy resource community remote access polic
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
 
A software engineer designs, develop, tests, and evaluates the sof.docx
A software engineer designs, develop, tests, and evaluates the sof.docxA software engineer designs, develop, tests, and evaluates the sof.docx
A software engineer designs, develop, tests, and evaluates the sof.docx
 
System security by Amin Pathan
System security by Amin PathanSystem security by Amin Pathan
System security by Amin Pathan
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
 
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docxSample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
 
4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx
4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx
4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should Know
 
To meet the requirements for lab 10 you were to perform Part 1, S
To meet the requirements for lab 10 you were to perform Part 1, STo meet the requirements for lab 10 you were to perform Part 1, S
To meet the requirements for lab 10 you were to perform Part 1, S
 
HIPAA Safeguard Slides
HIPAA Safeguard SlidesHIPAA Safeguard Slides
HIPAA Safeguard Slides
 
3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment Questionnaire3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment Questionnaire
 
Ch06 Policy
Ch06 PolicyCh06 Policy
Ch06 Policy
 
Authentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_webAuthentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_web
 
Mitre ATTACK and the North Korean Regime-Backed Programmer
Mitre ATTACK and the North Korean Regime-Backed ProgrammerMitre ATTACK and the North Korean Regime-Backed Programmer
Mitre ATTACK and the North Korean Regime-Backed Programmer
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-Practices
 
8 must dos for a perfect privileged account management strategy
8 must dos for a perfect privileged account management strategy8 must dos for a perfect privileged account management strategy
8 must dos for a perfect privileged account management strategy
 
Securing Your Servers Top 5 Essential Practices.pdf
Securing Your Servers Top 5 Essential Practices.pdfSecuring Your Servers Top 5 Essential Practices.pdf
Securing Your Servers Top 5 Essential Practices.pdf
 
Scenario Overview Now that you’re super knowledgeable about se.docx
Scenario Overview Now that you’re super knowledgeable about se.docxScenario Overview Now that you’re super knowledgeable about se.docx
Scenario Overview Now that you’re super knowledgeable about se.docx
 

More from LyndonPelletier761

300 words Building healthier cities and communities involves local.docx
300 words Building healthier cities and communities involves local.docx300 words Building healthier cities and communities involves local.docx
300 words Building healthier cities and communities involves local.docxLyndonPelletier761
 
300 words APA format, Select a current example of a policy issue t.docx
300 words APA format, Select a current example of a policy issue t.docx300 words APA format, Select a current example of a policy issue t.docx
300 words APA format, Select a current example of a policy issue t.docxLyndonPelletier761
 
300-400 wordsClick here to access American Rhetorics Top 100 .docx
300-400 wordsClick here to access American Rhetorics Top 100 .docx300-400 wordsClick here to access American Rhetorics Top 100 .docx
300-400 wordsClick here to access American Rhetorics Top 100 .docxLyndonPelletier761
 
3. Describe one of the five major themes of Progressive Reform outli.docx
3. Describe one of the five major themes of Progressive Reform outli.docx3. Describe one of the five major themes of Progressive Reform outli.docx
3. Describe one of the five major themes of Progressive Reform outli.docxLyndonPelletier761
 
3. How do culture and business of Ireland compare with US culture an.docx
3. How do culture and business of Ireland compare with US culture an.docx3. How do culture and business of Ireland compare with US culture an.docx
3. How do culture and business of Ireland compare with US culture an.docxLyndonPelletier761
 
3-page paper which you use the article from the below websites.docx
3-page paper which you use the article from the below websites.docx3-page paper which you use the article from the below websites.docx
3-page paper which you use the article from the below websites.docxLyndonPelletier761
 
3-page APA format reaction paper to the first four stages of develop.docx
3-page APA format reaction paper to the first four stages of develop.docx3-page APA format reaction paper to the first four stages of develop.docx
3-page APA format reaction paper to the first four stages of develop.docxLyndonPelletier761
 
350 words. Standard essay format- no sources needed1. Explain wh.docx
350 words. Standard essay format- no sources needed1. Explain wh.docx350 words. Standard essay format- no sources needed1. Explain wh.docx
350 words. Standard essay format- no sources needed1. Explain wh.docxLyndonPelletier761
 
300 - 500 words in APA format (in text citations) and refernce page..docx
300 - 500 words in APA format (in text citations) and refernce page..docx300 - 500 words in APA format (in text citations) and refernce page..docx
300 - 500 words in APA format (in text citations) and refernce page..docxLyndonPelletier761
 
300 words long addressing the following issues.its a discussion h.docx
300 words long addressing the following issues.its a discussion h.docx300 words long addressing the following issues.its a discussion h.docx
300 words long addressing the following issues.its a discussion h.docxLyndonPelletier761
 
3. Creativity and AdvertisingFind two advertisements in a magazi.docx
3. Creativity and AdvertisingFind two advertisements in a magazi.docx3. Creativity and AdvertisingFind two advertisements in a magazi.docx
3. Creativity and AdvertisingFind two advertisements in a magazi.docxLyndonPelletier761
 
3-page APA format reaction paper to the standards of thinking and th.docx
3-page APA format reaction paper to the standards of thinking and th.docx3-page APA format reaction paper to the standards of thinking and th.docx
3-page APA format reaction paper to the standards of thinking and th.docxLyndonPelletier761
 
3-5 pagesThe patrol division of a police department is the l.docx
3-5 pagesThe patrol division of a police department is the l.docx3-5 pagesThe patrol division of a police department is the l.docx
3-5 pagesThe patrol division of a police department is the l.docxLyndonPelletier761
 
3-5 pagesOfficer Landonio is now in the drug task force. H.docx
3-5 pagesOfficer Landonio is now in the drug task force. H.docx3-5 pagesOfficer Landonio is now in the drug task force. H.docx
3-5 pagesOfficer Landonio is now in the drug task force. H.docxLyndonPelletier761
 
3-4 paragraphsAssignment DetailsContemporary criminal just.docx
3-4 paragraphsAssignment DetailsContemporary criminal just.docx3-4 paragraphsAssignment DetailsContemporary criminal just.docx
3-4 paragraphsAssignment DetailsContemporary criminal just.docxLyndonPelletier761
 
3-4 paragraphsYou have received a complaint that someone in the .docx
3-4 paragraphsYou have received a complaint that someone in the .docx3-4 paragraphsYou have received a complaint that someone in the .docx
3-4 paragraphsYou have received a complaint that someone in the .docxLyndonPelletier761
 
3-4 pagesAPA STYLEThe U.S. has long been seen by many around t.docx
3-4 pagesAPA STYLEThe U.S. has long been seen by many around t.docx3-4 pagesAPA STYLEThe U.S. has long been seen by many around t.docx
3-4 pagesAPA STYLEThe U.S. has long been seen by many around t.docxLyndonPelletier761
 
3-5 pagesCommunity-oriented policing (COP) does involve th.docx
3-5 pagesCommunity-oriented policing (COP) does involve th.docx3-5 pagesCommunity-oriented policing (COP) does involve th.docx
3-5 pagesCommunity-oriented policing (COP) does involve th.docxLyndonPelletier761
 
3 to 4 line answers only each.No Plagarism.$25Need by 109201.docx
3 to 4 line answers only each.No Plagarism.$25Need by 109201.docx3 to 4 line answers only each.No Plagarism.$25Need by 109201.docx
3 to 4 line answers only each.No Plagarism.$25Need by 109201.docxLyndonPelletier761
 
3 page paper, double spaced, apa formatThis paper is technically.docx
3 page paper, double spaced, apa formatThis paper is technically.docx3 page paper, double spaced, apa formatThis paper is technically.docx
3 page paper, double spaced, apa formatThis paper is technically.docxLyndonPelletier761
 

More from LyndonPelletier761 (20)

300 words Building healthier cities and communities involves local.docx
300 words Building healthier cities and communities involves local.docx300 words Building healthier cities and communities involves local.docx
300 words Building healthier cities and communities involves local.docx
 
300 words APA format, Select a current example of a policy issue t.docx
300 words APA format, Select a current example of a policy issue t.docx300 words APA format, Select a current example of a policy issue t.docx
300 words APA format, Select a current example of a policy issue t.docx
 
300-400 wordsClick here to access American Rhetorics Top 100 .docx
300-400 wordsClick here to access American Rhetorics Top 100 .docx300-400 wordsClick here to access American Rhetorics Top 100 .docx
300-400 wordsClick here to access American Rhetorics Top 100 .docx
 
3. Describe one of the five major themes of Progressive Reform outli.docx
3. Describe one of the five major themes of Progressive Reform outli.docx3. Describe one of the five major themes of Progressive Reform outli.docx
3. Describe one of the five major themes of Progressive Reform outli.docx
 
3. How do culture and business of Ireland compare with US culture an.docx
3. How do culture and business of Ireland compare with US culture an.docx3. How do culture and business of Ireland compare with US culture an.docx
3. How do culture and business of Ireland compare with US culture an.docx
 
3-page paper which you use the article from the below websites.docx
3-page paper which you use the article from the below websites.docx3-page paper which you use the article from the below websites.docx
3-page paper which you use the article from the below websites.docx
 
3-page APA format reaction paper to the first four stages of develop.docx
3-page APA format reaction paper to the first four stages of develop.docx3-page APA format reaction paper to the first four stages of develop.docx
3-page APA format reaction paper to the first four stages of develop.docx
 
350 words. Standard essay format- no sources needed1. Explain wh.docx
350 words. Standard essay format- no sources needed1. Explain wh.docx350 words. Standard essay format- no sources needed1. Explain wh.docx
350 words. Standard essay format- no sources needed1. Explain wh.docx
 
300 - 500 words in APA format (in text citations) and refernce page..docx
300 - 500 words in APA format (in text citations) and refernce page..docx300 - 500 words in APA format (in text citations) and refernce page..docx
300 - 500 words in APA format (in text citations) and refernce page..docx
 
300 words long addressing the following issues.its a discussion h.docx
300 words long addressing the following issues.its a discussion h.docx300 words long addressing the following issues.its a discussion h.docx
300 words long addressing the following issues.its a discussion h.docx
 
3. Creativity and AdvertisingFind two advertisements in a magazi.docx
3. Creativity and AdvertisingFind two advertisements in a magazi.docx3. Creativity and AdvertisingFind two advertisements in a magazi.docx
3. Creativity and AdvertisingFind two advertisements in a magazi.docx
 
3-page APA format reaction paper to the standards of thinking and th.docx
3-page APA format reaction paper to the standards of thinking and th.docx3-page APA format reaction paper to the standards of thinking and th.docx
3-page APA format reaction paper to the standards of thinking and th.docx
 
3-5 pagesThe patrol division of a police department is the l.docx
3-5 pagesThe patrol division of a police department is the l.docx3-5 pagesThe patrol division of a police department is the l.docx
3-5 pagesThe patrol division of a police department is the l.docx
 
3-5 pagesOfficer Landonio is now in the drug task force. H.docx
3-5 pagesOfficer Landonio is now in the drug task force. H.docx3-5 pagesOfficer Landonio is now in the drug task force. H.docx
3-5 pagesOfficer Landonio is now in the drug task force. H.docx
 
3-4 paragraphsAssignment DetailsContemporary criminal just.docx
3-4 paragraphsAssignment DetailsContemporary criminal just.docx3-4 paragraphsAssignment DetailsContemporary criminal just.docx
3-4 paragraphsAssignment DetailsContemporary criminal just.docx
 
3-4 paragraphsYou have received a complaint that someone in the .docx
3-4 paragraphsYou have received a complaint that someone in the .docx3-4 paragraphsYou have received a complaint that someone in the .docx
3-4 paragraphsYou have received a complaint that someone in the .docx
 
3-4 pagesAPA STYLEThe U.S. has long been seen by many around t.docx
3-4 pagesAPA STYLEThe U.S. has long been seen by many around t.docx3-4 pagesAPA STYLEThe U.S. has long been seen by many around t.docx
3-4 pagesAPA STYLEThe U.S. has long been seen by many around t.docx
 
3-5 pagesCommunity-oriented policing (COP) does involve th.docx
3-5 pagesCommunity-oriented policing (COP) does involve th.docx3-5 pagesCommunity-oriented policing (COP) does involve th.docx
3-5 pagesCommunity-oriented policing (COP) does involve th.docx
 
3 to 4 line answers only each.No Plagarism.$25Need by 109201.docx
3 to 4 line answers only each.No Plagarism.$25Need by 109201.docx3 to 4 line answers only each.No Plagarism.$25Need by 109201.docx
3 to 4 line answers only each.No Plagarism.$25Need by 109201.docx
 
3 page paper, double spaced, apa formatThis paper is technically.docx
3 page paper, double spaced, apa formatThis paper is technically.docx3 page paper, double spaced, apa formatThis paper is technically.docx
3 page paper, double spaced, apa formatThis paper is technically.docx
 

Recently uploaded

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 

Recently uploaded (20)

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 

Implement a Successful Spam Filtering Policy

  • 1. Discussion Post an article review (minimum of 200 words) related to email, instant messaging, or web components. Case study Prepare a two page paper on the following: How would you implement a successful spam-filtering policy. You may use the internet for more information. Please double space your papers and cite your sources. Key words Select ten key terms from chapter 16 and ten key terms from chapter 17 and type the definitions of each. Chapter 16 · AOL Instant Messenger (AIM) · Botnet · DomainKeys Identified Mail (DKIM) · E-mail · E-mail hoax · Encryption · Instant messaging (IM) · Mail delivery agent (MDA) · Mail relaying · Mail transfer agent (MTA) Chapter 17 · JavaScript · Lightweight Directory Access Protocol (LDAP) · PHP · Plug-in
  • 2. · Secure Sockets Layer (SSL) · Server-side scripting · SSL stripping attack · Transport Layer Security (TLS) · Uniform Resource Locator (URL) · X.500 Create a Policy for the CMMC Framework Writing a policy is an essential task for any security professional to know how to generate, update, build, and follow. The below framework for a policy is broken down into eight parts. 1. Overview o State the overview of what this policy covers. 2. Purpose o State why this policy exists and its purpose 3. Scope o Who and what does this apply to? 4. Policy o The policy itself. o Guidelines o Rules for having the policy 5. Policy Compliance o How will it be verified that the policy is being meet?
  • 3. 6. Related Standards, Policies, and Processes o If any 7. Definitions and Terms o If any 8. Revision History o The date and summary of what changed since the last edit. Consensus Policy Resource Community Password Protection Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is no prior approval required. If you would like to contribute a new policy or updated version of this policy, please send email to [email protected] Last Update Status: Updated October, 2017 1. Overview Passwords are an important aspect of computer security. A poorly chosen password may result in unauthorized access and/or exploitation of our resources. Al l staff, including contractors and vendors with access to <Company Name> systems, are
  • 4. responsible for taking the appropriate steps, as outlined below, to select and secure their passwords. 2. Purpose The purpose of this policy is to establish a standard for creation of strong passwords and the protection of those passwords. 3. Scope The scope of this policy includes all personnel who have or are responsible for an account (or any form of access that supports or requires a password) on any system that resides at any <Company Name> facility, has access to the <Company Name> network, or stores any non- public <Company Name> information. 4. Policy 4.1 Password Creation 4.1.1 All user-level and system-level passwords must conform to the Password Construction Guidelines. 4.1.2 Users must use a separate, unique password for each of their work related accounts. Users may not use any work related passwords for their own, personal accounts. 4.1.3 User accounts that have system-level privileges granted through group memberships or programs such as sudo must have a unique password from all other accounts held by that user to access system-level privileges. In addition, it is highly recommend that some form of multi-factor authentication is used for any privileged
  • 5. accounts 4.2 Password Change 4.2.1 Passwords should be changed only when there is reason to believe a password has been compromised. 4.2.2 Password cracking or guessing may be performed on a periodic or random basis by the Infosec Team or its delegates. If a password is guessed or cracked during one of these scans, the user will be required to change it to be in compliance with the Password Construction Guidelines. Consensus Policy Resource Community 4.3 Password Protection 4.3.1 Passwords must not be shared with anyone, including supervisors and coworkers. All passwords are to be treated as sensitive, Confidential <Company Name> information. Corporate Information Security recognizes that legacy applications do not support proxy systems in place. Please refer to the technical reference for additional details. 4.3.2 Passwords must not be inserted into email messages, Alliance cases or other forms of
  • 6. electronic communication, nor revealed over the phone to anyone. 4.3.3 Passwords may be stored only in “password managers” authorized by the organization. 4.3.4 Do not use the "Remember Password" feature of applications (for example, web browsers). 4.3.5 Any user suspecting that his/her password may have been compromised must report the incident and change all passwords. 4.4 Application Development Application developers must ensure that their programs contain the following security precautions: 4.4.1 Applications must support authentication of individual users, not groups. 4.4.2 Applications must not store passwords in clear text or in any easily reversible form. 4.4.3 Applications must not transmit passwords in clear text over the network. 4.4.4 Applications must provide for some sort of role management, such that one user can take over the functions of another without having to know the other's password. 4.5 Multi-Factor Authentication 4.5.1 Multi-factor authentication is highly encouraged and should be used whenever possible, not only for work related accounts but personal accounts also.
  • 7. 5. Policy Compliance 5.1 Compliance Measurement The Infosec team will verify compliance to this policy through various methods, including but not limited to, periodic walk-throughs, video monitori ng, business tool reports, internal and external audits, and feedback to the policy owner. 5.2 Exceptions Any exception to the policy must be approved by the Infosec Team in advance. 5.3 Non-Compliance An employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment. Consensus Policy Resource Community 6 Related Standards, Policies and Processes • Password Construction Guidelines 7 Revision History Date of Change Responsible Summary of Change June 2014 SANS Policy Team Updated and converted to new format. October, 2017 SANS Policy Team Updated to confirm with new NIST SP800-63.3
  • 8. standards. Helpful Links • SANS Security Policy Templates main page • SANS Password Policy Document • Password Construction Guidelines – SANS Example • NIST 800-100 Information Security Handbook: A Guide for Managers • Internet DMZ Equipment Policy- • Virtual Private Network (VPN) Policy • Web Application Security Policy