Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

1. "Policy for Portable and Mobile Devices" Please respond to the following:

• Determine the primary considerations that an organization would need to take into account when developing the security policies involving bring your own device (BYOD), portable and mobile devices.

• List and examine the major challenges of enforcing policies concerning BYOD, portable and mobile devices.

2. Demilitarized Zone (DMZ) Control Standards" Please respond to the following:

• Analyze the IT infrastructure assets that are commonly located in the DMZ. Determine how the types and size of the organization impact the structure of the DMZ.

• Propose at least three policies that organizations need to implement for traffic flowing into the DMZ or out of the DMZ.

Reply to the other student answer below of the same questions above.

Analyze the IT infrastructure assets that are commonly located in the DMZ. Determine how the types and size of the organization impact the structure of the DMZ.

There are certain standards that require access control to the internet. The type and size of an organization impact the structure of the DMZ depending of the kind of access control is needed. "A Content Filtering standard is an example of a filtering policy.

It describes the control requirements for employee access to Web sites using employer-owned devices", (Johnson, page 244, 2011). Also, depending of the type of connectivity to the Internet, this can require changes to the policy and protocol filtering rules.

Propose at least three policies that organizations need to implement for traffic flowing into the DMZ or out of the DMZ.

External Information System Services Connect Standard is a policy that requires those who use LAN-to-WAN connectivity to establish a secure connection. Another policy needed to implement for traffic flowing into or out of the DMZ is the DMZ Control Standard.

It establishes the controls for publicly accessible devices to be placed in the specific architecture. The User Internet Proxy Standard establishes controls for an internet user proxy for all internet traffic coming in and out of the domain.

Johnson, R., Merkow, M. (2011). Security Policies and Implementation Issues.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92821205
  • Price:- $10

Priced at Now at $10, Verified Solution

Have any Question?


Related Questions in Management Information System

Assignmentthere have been more than a few newsworthy

Assignment There have been more than a few newsworthy failures to succeed relating to the implementation of enterprise resource planning systems (ERP) that resulted in lawsuits between companies and contracted solution p ...

Discussion briefly describe three 3 types of errors that

Discussion : Briefly describe three (3) types of errors that can occur in JavaScript. Determine which error you believe to be the most difficult to debug. Provide one (1) example of the error you believe to be the most d ...

Question sources that can help you with hardware

Question : Sources that can help you with hardware troubleshooting include the user manual, the Internet, online technical support, technical forums, diagnostic software and your network of technical associates. In which ...

Daily life requires us to have access to a lot of

Daily life requires us to have access to a lot of information, and information systems help us access that information. Desktop computers, laptops, and mobile devices keep us connected to the information we need through ...

The scenariomusic university has asked you to help them to

The Scenario Music University has asked you to help them to design their student performance data mart. Your requirements elicitation with the clients has determined that they are interested in answering questions such a ...

Please answer each question and cite any sources used1

Please answer Each question, and cite any sources used. 1. Review: Guide for Developing Security Plans for Federal Information Systems By Marianne Swanson and Joan Hash and Pauline Bowen. How does the the approach of inf ...

Q1 explain identification and assessment of emerging

Q1. Explain identification and assessment of emerging technologies? (APA format required, Turntin check required. Minimum 250 words essay) Q2. What criteria are used to rank current and emerging technology to get the bes ...

Project titlesecurity lapses and data breaches an

Project title:Security Lapses and Data Breaches: An Examination of the Failures to Protect Business Data and their Consequences Write up 3 problems/questions that related to the project title. I wrote some details in pro ...

Big data and data analytics are hot topics that are

Big data and data analytics are hot topics that are frequently in the media these days. Much of the application of these mathematical concepts is industry specific, and the information security industry is no exception. ...

Case study the brazilian federal data processing service

Case Study : The Brazilian Federal Data Processing Service Read the case study titled, "Brazil to fortify government email system following NSA snooping revelations,". Use the Internet to research the architectures that ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As