Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Remember from the beginning of this book how Amy's day started? Now imagine how it could have been: For Amy, the day began like any other at the Sequential Label and Supply Company (SLS) help desk. Taking calls and helping the office workers with computer problems was not glamorous, but she enjoyed the work; it was challenging and paid pretty well. Some of her friends in the industry worked at bigger companies, some at cutting-edge tech companies, but they all agreed that technology jobs were a good way to pay the bills. The phone rang, as it did on average about four times an hour, and about 28 times a day. The first call of the day, from a worried user hoping Amy could help him out of a jam, seemed typical. The call display on her monitor gave some of the facts: the user's name, his phone number, the department in which he worked, where his office was on the company campus, and a list of all the calls he'd made in the past. "Hi, Bob," Amy said. "Did you get that document formatting problem squared away?" "Sure did, Amy. Hope we can figure out what's going on this time." "We'll try, Bob. Tell me about it." "Well, I need help setting a page break in this new spreadsheet template I'm working on," Bob said. Amy smiled to herself. She knew spreadsheets well, so she would probably be able to close this call on the first contact. That would help her call statistics, which was one of the ways her job performance was measured. Little did Amy know that roughly four minutes before Bob's phone call, a specially programmed computer out at the edge of the SLS network had made a programmed decision. This computer was generally known as postoffice.seqlbl.com, but it was called the "e-mail gateway" by the networking, messaging, and information security teams at SLS. The decision it had made was just like many thousands of other decisions it made in a typical day-that is, to block the transmission of a file that was attached to an e-mail addressed to Bob.Hulme@seqlbl.com. The gateway had determined that Bob didn't need an executable program that had been attached to that e-mail message, which (the gateway also determined) originated from somewhere on the Internet but contained a forged reply-to address from Davey Martinez at SLS. In other words, the gateway had delivered the e-mail to Bob Hulme, but not the attachment. When Bob got the e-mail, all he saw was that another unsolicited commercial e-mail with an unwanted executable had been blocked. He had deleted the nuisance message without a second thought. While she was talking to Bob, Amy looked up to see Charles Moody walking calmly down the hall. Charlie, as he liked to be called, was the senior manager of the server administration team and also the company's chief information security officer. Kelvin Urich and Iris Majwubu were trailing behind Charlie as he headed from his office to the door of the conference room. Amy thought, "It must be time for the weekly security status meeting." She was the user representative on the company information security oversight committee, so she was due to attend this meeting. Amy continued talking Bob through the procedure for setting up a page break, and decided she would join the information security team for coffee and bagels as soon as she was finished.

Questions:

1. What area of the SP 800-100 management maintenance model addresses the actions of the content filter described here?

2. What recommendations would you give Sequential Label and Supply Company for how it might select a security management maintenance model?

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92085136

Have any Question?


Related Questions in Computer Engineering

Question you must use the following outline for your paper

Question: You MUST use the following outline for your paper. All direct and indirect quotes should be properly cited using APA formatting. All sections should be labeled. This week's paper is a final draft. All spelling, ...

Systems analysis project 12 please answer the 2 questions1

Systems analysis project 12: please answer the 2 questions 1. Develop a process for managing change requests and design a form to handle a generic change request. The process should include a contingency plan for changes ...

What are some skills individuals who work in the field of

What are some skills individuals who work in the field of cyber security need to prevent hacks in to a company's computers?

What is a good analogy of subnetting whats a break down of

What is a good analogy of Subnetting? What's a break down of how it is used within a company?

Suppose you are given a six-sided die that might be biased

Suppose you are given a six-sided die, that might be biased in an unknown way. Explain how to use die rolls to generate unbiased coin flips, and determine the expected number of die rolls until a coin flip is generated. ...

Explain a situation using the supply and demand for skilled

Explain a situation using the supply and demand for skilled labor in which the increased number of college graduates leads to depressed wages. Given the rising cost of going to college, explain why a college education wi ...

Question suppose a binary tree t has 10 nodes which are

Question : Suppose a binary tree T has 10 nodes which are labeled 0,1,2,...,9. We ran the inorder and postorder traversals on the tree and the nodes were processed in the following order: inorder traversal: 0,3,1,2,9,4,6 ...

Discuss how a successful organization should have the

Discuss how a successful organization should have the following multiple layers of security in place for the protection of its operations: Information security management. Data security Network security

Assignmentyou have been requested to develop a healthcare

Assignment You have been requested to develop a healthcare system with the following characteristics: A hospital plans to build a healthcare system, which manages patient information. A hospital has a CEO, 5 doctors, 5 n ...

Can someone help me with the following java question

Can someone help me with the following java question please (a) Implement a recursive search function in Java int terSearch(int arr[], int l, int r, int x) that returns location of x in a given sorted array arr[l...r] is ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As