SlideShare a Scribd company logo
1 of 9
After reading chapter 10
Watch.. https://www.youtube.com/watch?v=FLeTLzsSMnk "So
how important are those SAT's" on YouTube.
Then answer these questions
1-How do you answer questions from students or parents about
the difference between the test, and whether taking one test or
the other provides an advantage in the admission process?
2-How can counselors help students find out about
accommodations available to them based on their financial or
disability needs?
3- How would you advise a student or family who are concerned
about the influence of testing in college admission? What is the
appropriate way of describing the role of standardized
admission test in college admission decisions?
Section 1 - Information Security Management
1
WEEK 1: INFORMATION SECURITY MANAGMENTAcme
Toys, Inc. Network,[Brian Dennison]
IT454_IP1
1.0 Proposed Organization
Acme Toys, Inc. has been a leading manufacturer of toys. It
has a new building which acts as the headquarters and house the
company’s departments; marketing, accounting, distribution,
sales, manufacturing, IT and the R&D departments. Apart from
setting up the departments, the company has set up a big
network that has enabled sharing of resources and
communication between employees. Inside each department,
there are numerous workstations which are connected to the
department servers. Also, there is a main server that controls
the entire servers. The servers have been delivering support for:
Multiple processors, multiuser environment, large memory
requirements and support of distributed applications.
In addition, the network should be able to support high-level,
multiuser applications that will run simultaneously. The profiles
of employees range from a sales executive who is not computer
savvy to IT professionals and people in the R&D department
who are technology savvy. Due to the diverse user profiles, the
company also needs to consider the ease of use of the OS.
The IT department is in the process of planning its security
program in order to secure the information of the organization.
Although the entire company will be networked, a separate
network is required for the R&D department because of security
reasons. This department should be deployed with strong
security technologies and procedures. In addition, the
manufacturing department plans to expand its network within
the next six months by fifty percent.
2.0 Principles of Security Management
2.1 People
Since the workforce of this organization consists of employees
with different duties and levels of computer usage, then
measures should be placed to control the access level of the
systems on stored information. For instance, the sales
executives are naïve to computer usage. Thus other than being
able to have easy of access of information and in a summarized
format, they should have less privileges of access. For instance,
they should have permission to retrieve information but not
modify. Therefore, they are required to act as clients to the
servers who request recourses from the servers but with minimal
modification to the information. As a result, the network is
supposed to have procedures that provide higher abstraction at
the pertinent clients.
On the other hand, the IT professionals need to access the
network resources in dept. they would thus require more
privileges of access to the architecture of the network. They
should be able to perform activities such as network monitoring
and control, add or remove network accounts and modify group
policies of the network.
2.2 Technology
Apart from providing support of communication in the network,
the technology applied in the organization should be able to
provide security of the network resources. Furthermore, they
should be up to date with the current world in order to cater for
new issues and threats. (
Most importantly, the R&D department should have an
exceptional.ly high security since it requires transaction of
information which is very sensitive. The technology should
ensure that information exchanges as well business transaction
between the departments is trusted in terms of non-repudiation
and authenticity.
2.3 Process
The activities pertaining the securing of the network should be
well planned. Certain procedures should be deployed to regular
check security threats, maintain the network and update
servicing. This would ensure that the network safety is not
jeopardized out of ignorance. For instance, IT professionals
should regular be checking the network like assessing the data
traffic to identify any irregularities of data packet transfer.
3.0 Project Management Role
In order to implement security management in Acme Toys, Inc.
network, a systematic strategy should be designed. The project
should be arranged into stages which range from the evaluation
of the network to the implementation of methods for security
management.
Apparently, the project management acts a big role of
evaluating the current security measures of the organization.
This would involve reviewing the existing ‘Information Security
Management Policies’ to determine if they are still applicable in
all the security areas of the organization. This ensures that all
the security loopholes are identified and are ready to be solved
Secondly, the project management acts a role of planning the
security measures to be assessed and established. This typically
is involved where guidelines and time schedule are provided for
the project scope. For instance, risk analysis and management of
the network is performed.
Project management plays a role in the implementation of the
security policies. In this stage, awareness is created to the
network users about the new security policies. They are
informed about how to implement such security policies. The
awareness ensures that the users feel the responsibility of taking
the security measure of the network in their hands. This would
thus buffer the security of the network.
After this the evaluation of the network security policies
achieved by the project should be performed. This involves
carrying out regular internal and external audits of the IT
systems. Also, self-assessment and reaction to security
occurrences should be observed. Then maintenance is performed
to learn and improve the security control measures. All these
are the role of project management.
References
Tipton, H. F., & Krause, M. (2003). Information security
management handbook. CRC Press.
Information Security Management. (n.d.). Retrieved February
28, 2016, from
http://www.tutorialspoint.com/itil/information_security_manage
ment.htm
Week 2
1.0 Data Classification Schema
The information and data assets pertinent to Acme Toys, Inc.
needs to be classified based on risks related with stored or
processed data. Those of highest risk require the strongest
protection level to hamper compromise while those with less
risk need proportionately lower protection.
1.1 Public
This include information and data implicitly or explicitly
permitted for dissemination to public with no restrictions. The
distribution can be done freely without any emergent harm to
the Acme Toys, Inc. organization, individuals or affiliates.
This security program classify the following data as being
public since they are less sensitivity with no unauthorized
disclosure;
a. the Acme Toys, Inc. website (which is the main source of
advertisement for the products),
b. department general description,
c. opening and closing schedules for departments,
d. toys/products’ catalogue and
e. Press release.
1.2 Internal
This level includes data/information intended for the internal
business of the Acme Toys, Inc. This includes data restricted to
the specific departments such as the manufacturing and sales
departments with legitimate needs. These data are unavailable
to parties outside the Acme Toys, Inc. community and have
potential impact to the organization but with moderate
sensitivity. These data include;
a. employees salary records
b. employees’ departmental user account information
c. sales records on daily basis (only pertinent to users in the
sales department)
d. raw materials vendors’ information
e. stock information
f. directory information of employees except whose
requesting non-disclosure
g. network transaction logs
1.3 Confidential
This defines data for is highly sensitive and is intended for
specific persons with explicit authorization required to access
information. The unauthorized of such information would lead
to adverse impact on the organization business, such
information classified from the organization include;
a. Individuals personal privacy
b. Compliance with the state and federal laws. This is
specifically important for the R&D department which is highly
secured.
c. Regulations and the vendor’s contracts.
2.0 Existing frameworks
2.1 Network segmentation
The network is divided into segments. Each department has its
own network segment or subnet. This would act as a potential
framework for implementing the security program into groups
of manageable units.
2.2 Client-server Architecture
The fact that the network architecture of the organization is
server-based would be advantageous to the implementation of
the security program. This is because server-based architecture
would enable easy management and centralization of network
resources and distributed applications and hence easy
implementation of security measures. For instance, if a network
group policy is applied to the server, then the policy would
apply to this specific
2.3 Separation of sensitive departments
The R&D department has its own independent network different
form the other departments. This is a good framework of
deploying an independent security policy that is more advanced
and aware of the security sensitivity of the delicate R&D
department network.
3.0 Need for Management Support
Reliable experience is the backbone for the structuring of
security program in the Acme Toys, Inc. Network. Without it, it
would be remarkably tiresome and leading to inaccurate
development of the security program. The management has been
the pioneer to the development of the network architecture of
the organization. Mind you, they are the ones who have been
using the systems. Therefore, there is need for the management
support to be involved in the security program.
3.1 Source of Information
Firstly, the management know the pros and cons of the system
and hence acting as an existing source of information which is
readily available with less effort. Having used the network day-
in-day-out would definitely infer that weaknesses and strengths
in the security measures of the organization’s systems are
observable. The management may have been receiving
complaints and undesirable conditions from the users.
Therefore, they would provide a valuable information about the
security of the organization’s systems.
3.2 Source of finance
Expenditure guarantee and financing of the security program is
in the hands of the management. The budget strap of the
organization would determine the amount of effort applied in
the program as well as the expanse of the security technology
and measures invested in the organization. If the management is
willing to invest much in security, then a promising thru output
of the security program would be achieved. Hence the need of
management support is very crucial for the success of the
security program.
3.4 Necessary for evaluation
Making the organization feel that they are part and person of
their own security is strikingly important reason as to why the
management support is crucial in the security program. This is
because it would apparently result to relatively more
satisfaction at the completion of the security program than when
the task of developing the security program is solely on the
shoulders of the experts. This would mean that during the
development and implementation of the security program, the
management would provide its own opinion and most of the task
would be done sweeting the needs of the management.
For instance, an expert may technically feel comfortable with a
certain security measure because according to the expert it is
efficient in preventing threats. However, the management would
fill that the measure is more complicated to handle and it would
compromise the ease of use for the organization’s users.
Therefore, the management’s view should be importantly be
taken into consideration in order to bring up satisfaction of the
security program. Thus the management support is crucial for
the success of the security program.
3.5 Important in the implementation
Training the workforce on how to use and implement the
security program makes the management support very crucial.
This is because when incorporated in the development of the
security program, the management would provide a good
platform in training the rest of the users on configuring the
security program. For instance, they would provide good
schedule of time for its users to indulge in a training - which
can be part time. Also, they can arrange seminars and
symposium of bringing awareness of the security program.
4.0 Reporting Methods
4.1 Statistical reporting
The user’s views about the current security conditions of the
organization and the viability of the proposed security program
would be summarized from the questioner’s findings. For
instance, the number of users complaining on cases of security
threats of the workstation accounts and servers file directories
can be recorded down on paper and the statistics presented to
the management. This would indicate the progress of the
security program in its stage off gathering information.
4.2 Report Writing
Reports on the progress of the security program can be
developed and printed then presented to the management. The
reports can be in form of written paragraphs or short notes
which describe about how the security program has been
advancing. For instance, the list of security equipment,
recommendations and feasibility study of the security program
can be written in a report format, edited and published for the
management to read. Also, the softcopy of the report can be
communicated through using email and social media such as
Facebook and twitter.
4.3 Direct communication
Direct verbal communication with the management about the
security program can be a good way of reporting. The persons
involved in the security program can communicate to the
management through table sitting, phone call or video
conferencing and discuss the progress of the security program.

More Related Content

Similar to After reading chapter 10Watch.. httpswww.youtube.comwatc.docx

Azstec cyber-security-workbook
Azstec cyber-security-workbookAzstec cyber-security-workbook
Azstec cyber-security-workbookYulia Dianova
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 
Replies Required for below Posting 1 user security awarene.docx
Replies Required for below  Posting 1  user security awarene.docxReplies Required for below  Posting 1  user security awarene.docx
Replies Required for below Posting 1 user security awarene.docxsodhi3
 
The Federal Information Security Management Act
The Federal Information Security Management ActThe Federal Information Security Management Act
The Federal Information Security Management ActMichelle Singh
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxInfosectrain3
 
REVIEW OF GOOGLE’S CYBER SECURITY POLICYNAMEINSTRUCTOR’S N.docx
REVIEW OF GOOGLE’S CYBER SECURITY POLICYNAMEINSTRUCTOR’S N.docxREVIEW OF GOOGLE’S CYBER SECURITY POLICYNAMEINSTRUCTOR’S N.docx
REVIEW OF GOOGLE’S CYBER SECURITY POLICYNAMEINSTRUCTOR’S N.docxjoellemurphey
 
Data Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to KnowData Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to KnowRoger Hagedorn
 
Mobile Application Security by Design
Mobile Application Security by DesignMobile Application Security by Design
Mobile Application Security by DesignDMI
 
27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docxlorainedeserre
 
27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docxjesusamckone
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docxtoltonkendal
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxrtodd599
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxjeffsrosalyn
 

Similar to After reading chapter 10Watch.. httpswww.youtube.comwatc.docx (15)

Azstec cyber-security-workbook
Azstec cyber-security-workbookAzstec cyber-security-workbook
Azstec cyber-security-workbook
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
Replies Required for below Posting 1 user security awarene.docx
Replies Required for below  Posting 1  user security awarene.docxReplies Required for below  Posting 1  user security awarene.docx
Replies Required for below Posting 1 user security awarene.docx
 
The Federal Information Security Management Act
The Federal Information Security Management ActThe Federal Information Security Management Act
The Federal Information Security Management Act
 
Conference Paper at International Conference on Enterprise Information System...
Conference Paper at International Conference on Enterprise Information System...Conference Paper at International Conference on Enterprise Information System...
Conference Paper at International Conference on Enterprise Information System...
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptx
 
REVIEW OF GOOGLE’S CYBER SECURITY POLICYNAMEINSTRUCTOR’S N.docx
REVIEW OF GOOGLE’S CYBER SECURITY POLICYNAMEINSTRUCTOR’S N.docxREVIEW OF GOOGLE’S CYBER SECURITY POLICYNAMEINSTRUCTOR’S N.docx
REVIEW OF GOOGLE’S CYBER SECURITY POLICYNAMEINSTRUCTOR’S N.docx
 
Data Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to KnowData Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to Know
 
Mobile Application Security by Design
Mobile Application Security by DesignMobile Application Security by Design
Mobile Application Security by Design
 
27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx
 
27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docx
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
 

More from nettletondevon

Your NamePractical ConnectionYour NameNOTE To insert a .docx
Your NamePractical ConnectionYour NameNOTE To insert a .docxYour NamePractical ConnectionYour NameNOTE To insert a .docx
Your NamePractical ConnectionYour NameNOTE To insert a .docxnettletondevon
 
Your namePresenter’s name(s) DateTITILE Motivatio.docx
Your namePresenter’s name(s) DateTITILE Motivatio.docxYour namePresenter’s name(s) DateTITILE Motivatio.docx
Your namePresenter’s name(s) DateTITILE Motivatio.docxnettletondevon
 
Your nameProfessor NameCourseDatePaper Outline.docx
Your nameProfessor NameCourseDatePaper Outline.docxYour nameProfessor NameCourseDatePaper Outline.docx
Your nameProfessor NameCourseDatePaper Outline.docxnettletondevon
 
Your name _________________________________ Date of submission _.docx
Your name _________________________________ Date of submission _.docxYour name _________________________________ Date of submission _.docx
Your name _________________________________ Date of submission _.docxnettletondevon
 
Your NameECD 310 Exceptional Learning and InclusionInstruct.docx
Your NameECD 310 Exceptional Learning and InclusionInstruct.docxYour NameECD 310 Exceptional Learning and InclusionInstruct.docx
Your NameECD 310 Exceptional Learning and InclusionInstruct.docxnettletondevon
 
Your Name University of the Cumberlands ISOL634-25 P.docx
Your Name University of the Cumberlands ISOL634-25 P.docxYour Name University of the Cumberlands ISOL634-25 P.docx
Your Name University of the Cumberlands ISOL634-25 P.docxnettletondevon
 
Your Name Professor Name Subject Name 06 Apr.docx
Your Name  Professor Name  Subject Name  06 Apr.docxYour Name  Professor Name  Subject Name  06 Apr.docx
Your Name Professor Name Subject Name 06 Apr.docxnettletondevon
 
Your muscular system examassignment is to describe location (su.docx
Your muscular system examassignment is to describe location (su.docxYour muscular system examassignment is to describe location (su.docx
Your muscular system examassignment is to describe location (su.docxnettletondevon
 
Your midterm will be a virtual, individual assignment. You can choos.docx
Your midterm will be a virtual, individual assignment. You can choos.docxYour midterm will be a virtual, individual assignment. You can choos.docx
Your midterm will be a virtual, individual assignment. You can choos.docxnettletondevon
 
Your local art museum has asked you to design a gallery dedicated to.docx
Your local art museum has asked you to design a gallery dedicated to.docxYour local art museum has asked you to design a gallery dedicated to.docx
Your local art museum has asked you to design a gallery dedicated to.docxnettletondevon
 
Your letter should include Introduction – Include your name, i.docx
Your letter should include Introduction – Include your name, i.docxYour letter should include Introduction – Include your name, i.docx
Your letter should include Introduction – Include your name, i.docxnettletondevon
 
Your legal analysis should be approximately 500 wordsDetermine.docx
Your legal analysis should be approximately 500 wordsDetermine.docxYour legal analysis should be approximately 500 wordsDetermine.docx
Your legal analysis should be approximately 500 wordsDetermine.docxnettletondevon
 
Your Last Name 1Your Name Teacher Name English cl.docx
Your Last Name  1Your Name Teacher Name English cl.docxYour Last Name  1Your Name Teacher Name English cl.docx
Your Last Name 1Your Name Teacher Name English cl.docxnettletondevon
 
Your job is to delegate job tasks to each healthcare practitioner (U.docx
Your job is to delegate job tasks to each healthcare practitioner (U.docxYour job is to delegate job tasks to each healthcare practitioner (U.docx
Your job is to delegate job tasks to each healthcare practitioner (U.docxnettletondevon
 
Your job is to look at the routing tables and DRAW (on a piece of pa.docx
Your job is to look at the routing tables and DRAW (on a piece of pa.docxYour job is to look at the routing tables and DRAW (on a piece of pa.docx
Your job is to look at the routing tables and DRAW (on a piece of pa.docxnettletondevon
 
Your job is to design a user interface that displays the lotto.docx
Your job is to design a user interface that displays the lotto.docxYour job is to design a user interface that displays the lotto.docx
Your job is to design a user interface that displays the lotto.docxnettletondevon
 
Your Introduction of the StudyYour Purpose of the stud.docx
Your Introduction of the StudyYour Purpose of the stud.docxYour Introduction of the StudyYour Purpose of the stud.docx
Your Introduction of the StudyYour Purpose of the stud.docxnettletondevon
 
Your instructor will assign peer reviewers. You will review a fell.docx
Your instructor will assign peer reviewers. You will review a fell.docxYour instructor will assign peer reviewers. You will review a fell.docx
Your instructor will assign peer reviewers. You will review a fell.docxnettletondevon
 
Your initial reading is a close examination of the work youve c.docx
Your initial reading is a close examination of the work youve c.docxYour initial reading is a close examination of the work youve c.docx
Your initial reading is a close examination of the work youve c.docxnettletondevon
 
Your initial posting must be no less than 200 words each and is due .docx
Your initial posting must be no less than 200 words each and is due .docxYour initial posting must be no less than 200 words each and is due .docx
Your initial posting must be no less than 200 words each and is due .docxnettletondevon
 

More from nettletondevon (20)

Your NamePractical ConnectionYour NameNOTE To insert a .docx
Your NamePractical ConnectionYour NameNOTE To insert a .docxYour NamePractical ConnectionYour NameNOTE To insert a .docx
Your NamePractical ConnectionYour NameNOTE To insert a .docx
 
Your namePresenter’s name(s) DateTITILE Motivatio.docx
Your namePresenter’s name(s) DateTITILE Motivatio.docxYour namePresenter’s name(s) DateTITILE Motivatio.docx
Your namePresenter’s name(s) DateTITILE Motivatio.docx
 
Your nameProfessor NameCourseDatePaper Outline.docx
Your nameProfessor NameCourseDatePaper Outline.docxYour nameProfessor NameCourseDatePaper Outline.docx
Your nameProfessor NameCourseDatePaper Outline.docx
 
Your name _________________________________ Date of submission _.docx
Your name _________________________________ Date of submission _.docxYour name _________________________________ Date of submission _.docx
Your name _________________________________ Date of submission _.docx
 
Your NameECD 310 Exceptional Learning and InclusionInstruct.docx
Your NameECD 310 Exceptional Learning and InclusionInstruct.docxYour NameECD 310 Exceptional Learning and InclusionInstruct.docx
Your NameECD 310 Exceptional Learning and InclusionInstruct.docx
 
Your Name University of the Cumberlands ISOL634-25 P.docx
Your Name University of the Cumberlands ISOL634-25 P.docxYour Name University of the Cumberlands ISOL634-25 P.docx
Your Name University of the Cumberlands ISOL634-25 P.docx
 
Your Name Professor Name Subject Name 06 Apr.docx
Your Name  Professor Name  Subject Name  06 Apr.docxYour Name  Professor Name  Subject Name  06 Apr.docx
Your Name Professor Name Subject Name 06 Apr.docx
 
Your muscular system examassignment is to describe location (su.docx
Your muscular system examassignment is to describe location (su.docxYour muscular system examassignment is to describe location (su.docx
Your muscular system examassignment is to describe location (su.docx
 
Your midterm will be a virtual, individual assignment. You can choos.docx
Your midterm will be a virtual, individual assignment. You can choos.docxYour midterm will be a virtual, individual assignment. You can choos.docx
Your midterm will be a virtual, individual assignment. You can choos.docx
 
Your local art museum has asked you to design a gallery dedicated to.docx
Your local art museum has asked you to design a gallery dedicated to.docxYour local art museum has asked you to design a gallery dedicated to.docx
Your local art museum has asked you to design a gallery dedicated to.docx
 
Your letter should include Introduction – Include your name, i.docx
Your letter should include Introduction – Include your name, i.docxYour letter should include Introduction – Include your name, i.docx
Your letter should include Introduction – Include your name, i.docx
 
Your legal analysis should be approximately 500 wordsDetermine.docx
Your legal analysis should be approximately 500 wordsDetermine.docxYour legal analysis should be approximately 500 wordsDetermine.docx
Your legal analysis should be approximately 500 wordsDetermine.docx
 
Your Last Name 1Your Name Teacher Name English cl.docx
Your Last Name  1Your Name Teacher Name English cl.docxYour Last Name  1Your Name Teacher Name English cl.docx
Your Last Name 1Your Name Teacher Name English cl.docx
 
Your job is to delegate job tasks to each healthcare practitioner (U.docx
Your job is to delegate job tasks to each healthcare practitioner (U.docxYour job is to delegate job tasks to each healthcare practitioner (U.docx
Your job is to delegate job tasks to each healthcare practitioner (U.docx
 
Your job is to look at the routing tables and DRAW (on a piece of pa.docx
Your job is to look at the routing tables and DRAW (on a piece of pa.docxYour job is to look at the routing tables and DRAW (on a piece of pa.docx
Your job is to look at the routing tables and DRAW (on a piece of pa.docx
 
Your job is to design a user interface that displays the lotto.docx
Your job is to design a user interface that displays the lotto.docxYour job is to design a user interface that displays the lotto.docx
Your job is to design a user interface that displays the lotto.docx
 
Your Introduction of the StudyYour Purpose of the stud.docx
Your Introduction of the StudyYour Purpose of the stud.docxYour Introduction of the StudyYour Purpose of the stud.docx
Your Introduction of the StudyYour Purpose of the stud.docx
 
Your instructor will assign peer reviewers. You will review a fell.docx
Your instructor will assign peer reviewers. You will review a fell.docxYour instructor will assign peer reviewers. You will review a fell.docx
Your instructor will assign peer reviewers. You will review a fell.docx
 
Your initial reading is a close examination of the work youve c.docx
Your initial reading is a close examination of the work youve c.docxYour initial reading is a close examination of the work youve c.docx
Your initial reading is a close examination of the work youve c.docx
 
Your initial posting must be no less than 200 words each and is due .docx
Your initial posting must be no less than 200 words each and is due .docxYour initial posting must be no less than 200 words each and is due .docx
Your initial posting must be no less than 200 words each and is due .docx
 

Recently uploaded

NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfstareducators107
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answersdalebeck957
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningMarc Dusseiller Dusjagr
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111GangaMaiya1
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17Celine George
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 

Recently uploaded (20)

NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 

After reading chapter 10Watch.. httpswww.youtube.comwatc.docx

  • 1. After reading chapter 10 Watch.. https://www.youtube.com/watch?v=FLeTLzsSMnk "So how important are those SAT's" on YouTube. Then answer these questions 1-How do you answer questions from students or parents about the difference between the test, and whether taking one test or the other provides an advantage in the admission process? 2-How can counselors help students find out about accommodations available to them based on their financial or disability needs? 3- How would you advise a student or family who are concerned about the influence of testing in college admission? What is the appropriate way of describing the role of standardized admission test in college admission decisions? Section 1 - Information Security Management 1 WEEK 1: INFORMATION SECURITY MANAGMENTAcme Toys, Inc. Network,[Brian Dennison] IT454_IP1
  • 2. 1.0 Proposed Organization Acme Toys, Inc. has been a leading manufacturer of toys. It has a new building which acts as the headquarters and house the company’s departments; marketing, accounting, distribution, sales, manufacturing, IT and the R&D departments. Apart from setting up the departments, the company has set up a big network that has enabled sharing of resources and communication between employees. Inside each department, there are numerous workstations which are connected to the department servers. Also, there is a main server that controls the entire servers. The servers have been delivering support for: Multiple processors, multiuser environment, large memory requirements and support of distributed applications. In addition, the network should be able to support high-level, multiuser applications that will run simultaneously. The profiles of employees range from a sales executive who is not computer savvy to IT professionals and people in the R&D department who are technology savvy. Due to the diverse user profiles, the company also needs to consider the ease of use of the OS. The IT department is in the process of planning its security program in order to secure the information of the organization. Although the entire company will be networked, a separate network is required for the R&D department because of security reasons. This department should be deployed with strong security technologies and procedures. In addition, the manufacturing department plans to expand its network within the next six months by fifty percent.
  • 3. 2.0 Principles of Security Management 2.1 People Since the workforce of this organization consists of employees with different duties and levels of computer usage, then measures should be placed to control the access level of the systems on stored information. For instance, the sales executives are naïve to computer usage. Thus other than being able to have easy of access of information and in a summarized format, they should have less privileges of access. For instance, they should have permission to retrieve information but not modify. Therefore, they are required to act as clients to the servers who request recourses from the servers but with minimal modification to the information. As a result, the network is supposed to have procedures that provide higher abstraction at the pertinent clients. On the other hand, the IT professionals need to access the network resources in dept. they would thus require more privileges of access to the architecture of the network. They should be able to perform activities such as network monitoring and control, add or remove network accounts and modify group policies of the network. 2.2 Technology Apart from providing support of communication in the network, the technology applied in the organization should be able to provide security of the network resources. Furthermore, they should be up to date with the current world in order to cater for new issues and threats. ( Most importantly, the R&D department should have an exceptional.ly high security since it requires transaction of information which is very sensitive. The technology should ensure that information exchanges as well business transaction between the departments is trusted in terms of non-repudiation and authenticity. 2.3 Process The activities pertaining the securing of the network should be well planned. Certain procedures should be deployed to regular
  • 4. check security threats, maintain the network and update servicing. This would ensure that the network safety is not jeopardized out of ignorance. For instance, IT professionals should regular be checking the network like assessing the data traffic to identify any irregularities of data packet transfer. 3.0 Project Management Role In order to implement security management in Acme Toys, Inc. network, a systematic strategy should be designed. The project should be arranged into stages which range from the evaluation of the network to the implementation of methods for security management. Apparently, the project management acts a big role of evaluating the current security measures of the organization. This would involve reviewing the existing ‘Information Security Management Policies’ to determine if they are still applicable in all the security areas of the organization. This ensures that all the security loopholes are identified and are ready to be solved Secondly, the project management acts a role of planning the security measures to be assessed and established. This typically is involved where guidelines and time schedule are provided for the project scope. For instance, risk analysis and management of the network is performed. Project management plays a role in the implementation of the security policies. In this stage, awareness is created to the network users about the new security policies. They are informed about how to implement such security policies. The awareness ensures that the users feel the responsibility of taking the security measure of the network in their hands. This would thus buffer the security of the network. After this the evaluation of the network security policies achieved by the project should be performed. This involves carrying out regular internal and external audits of the IT systems. Also, self-assessment and reaction to security occurrences should be observed. Then maintenance is performed to learn and improve the security control measures. All these are the role of project management.
  • 5. References Tipton, H. F., & Krause, M. (2003). Information security management handbook. CRC Press. Information Security Management. (n.d.). Retrieved February 28, 2016, from http://www.tutorialspoint.com/itil/information_security_manage ment.htm Week 2 1.0 Data Classification Schema The information and data assets pertinent to Acme Toys, Inc. needs to be classified based on risks related with stored or processed data. Those of highest risk require the strongest protection level to hamper compromise while those with less risk need proportionately lower protection. 1.1 Public This include information and data implicitly or explicitly permitted for dissemination to public with no restrictions. The distribution can be done freely without any emergent harm to the Acme Toys, Inc. organization, individuals or affiliates. This security program classify the following data as being public since they are less sensitivity with no unauthorized disclosure; a. the Acme Toys, Inc. website (which is the main source of advertisement for the products), b. department general description, c. opening and closing schedules for departments, d. toys/products’ catalogue and e. Press release. 1.2 Internal
  • 6. This level includes data/information intended for the internal business of the Acme Toys, Inc. This includes data restricted to the specific departments such as the manufacturing and sales departments with legitimate needs. These data are unavailable to parties outside the Acme Toys, Inc. community and have potential impact to the organization but with moderate sensitivity. These data include; a. employees salary records b. employees’ departmental user account information c. sales records on daily basis (only pertinent to users in the sales department) d. raw materials vendors’ information e. stock information f. directory information of employees except whose requesting non-disclosure g. network transaction logs 1.3 Confidential This defines data for is highly sensitive and is intended for specific persons with explicit authorization required to access information. The unauthorized of such information would lead to adverse impact on the organization business, such information classified from the organization include; a. Individuals personal privacy b. Compliance with the state and federal laws. This is specifically important for the R&D department which is highly secured. c. Regulations and the vendor’s contracts. 2.0 Existing frameworks 2.1 Network segmentation The network is divided into segments. Each department has its own network segment or subnet. This would act as a potential framework for implementing the security program into groups of manageable units. 2.2 Client-server Architecture
  • 7. The fact that the network architecture of the organization is server-based would be advantageous to the implementation of the security program. This is because server-based architecture would enable easy management and centralization of network resources and distributed applications and hence easy implementation of security measures. For instance, if a network group policy is applied to the server, then the policy would apply to this specific 2.3 Separation of sensitive departments The R&D department has its own independent network different form the other departments. This is a good framework of deploying an independent security policy that is more advanced and aware of the security sensitivity of the delicate R&D department network. 3.0 Need for Management Support Reliable experience is the backbone for the structuring of security program in the Acme Toys, Inc. Network. Without it, it would be remarkably tiresome and leading to inaccurate development of the security program. The management has been the pioneer to the development of the network architecture of the organization. Mind you, they are the ones who have been using the systems. Therefore, there is need for the management support to be involved in the security program. 3.1 Source of Information Firstly, the management know the pros and cons of the system and hence acting as an existing source of information which is readily available with less effort. Having used the network day- in-day-out would definitely infer that weaknesses and strengths in the security measures of the organization’s systems are observable. The management may have been receiving complaints and undesirable conditions from the users. Therefore, they would provide a valuable information about the security of the organization’s systems. 3.2 Source of finance Expenditure guarantee and financing of the security program is
  • 8. in the hands of the management. The budget strap of the organization would determine the amount of effort applied in the program as well as the expanse of the security technology and measures invested in the organization. If the management is willing to invest much in security, then a promising thru output of the security program would be achieved. Hence the need of management support is very crucial for the success of the security program. 3.4 Necessary for evaluation Making the organization feel that they are part and person of their own security is strikingly important reason as to why the management support is crucial in the security program. This is because it would apparently result to relatively more satisfaction at the completion of the security program than when the task of developing the security program is solely on the shoulders of the experts. This would mean that during the development and implementation of the security program, the management would provide its own opinion and most of the task would be done sweeting the needs of the management. For instance, an expert may technically feel comfortable with a certain security measure because according to the expert it is efficient in preventing threats. However, the management would fill that the measure is more complicated to handle and it would compromise the ease of use for the organization’s users. Therefore, the management’s view should be importantly be taken into consideration in order to bring up satisfaction of the security program. Thus the management support is crucial for the success of the security program. 3.5 Important in the implementation Training the workforce on how to use and implement the security program makes the management support very crucial. This is because when incorporated in the development of the security program, the management would provide a good platform in training the rest of the users on configuring the security program. For instance, they would provide good schedule of time for its users to indulge in a training - which
  • 9. can be part time. Also, they can arrange seminars and symposium of bringing awareness of the security program. 4.0 Reporting Methods 4.1 Statistical reporting The user’s views about the current security conditions of the organization and the viability of the proposed security program would be summarized from the questioner’s findings. For instance, the number of users complaining on cases of security threats of the workstation accounts and servers file directories can be recorded down on paper and the statistics presented to the management. This would indicate the progress of the security program in its stage off gathering information. 4.2 Report Writing Reports on the progress of the security program can be developed and printed then presented to the management. The reports can be in form of written paragraphs or short notes which describe about how the security program has been advancing. For instance, the list of security equipment, recommendations and feasibility study of the security program can be written in a report format, edited and published for the management to read. Also, the softcopy of the report can be communicated through using email and social media such as Facebook and twitter. 4.3 Direct communication Direct verbal communication with the management about the security program can be a good way of reporting. The persons involved in the security program can communicate to the management through table sitting, phone call or video conferencing and discuss the progress of the security program.