Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

You are an independent consultant who specializes in Information Technology security issues. You have been retained by the Designer Distributions Company, a mid-sized and growing consumer goods distribution company, for an assignment to assess the state of their computing environment security situation. The company's newly hired VP of IT is conducting this project because she does not have a security specialist on her staff and has learned that the company does not have a comprehensive security strategy. In fact, she suspects lack of even basic security knowledge in both the IT staff and the user community.

The company has a headquarters office building, which includes the principal data center, and a separate warehouse linked to the office by an private data network. The warehouse has a small computing facility of its own for order shipment data entry and tracking. This computer is linked to the headquarters order entry systems through the network. Additionally, there are Internet-based data links to several key suppliers used to share reorder, production and shipping schedules and status information. When potential new suppliers compete for contracts with Designer Distributions, their proposals are received and negotiated via Email.

You have been interviewing executives and staff at the company and at key suppliers and are beginning to evaluate what you have learned in preparation for preparing your report to the VP of IT.

Problem 1
Deliverable Length: 5-7 paragraphs
Details: As Designer Distributions' security consultant, you have made proposals for several security measures intended to prevent disruption to the computing environment and to prevent loss or unauthorized access/modifications to sensitive data. You have also recommended significant investments in recovery capability. These include creating, testing, and maintaining a Disaster Recovery Plan for the data center, and an Intrusion Detection software package for the network. Some department managers are challenging what they see to be an unnecessary double investment in prevention and recovery.

Post 5-7 paragraphs defending your rationale for investing in these recovery capabilities.

Problem 2
Deliverable Length: 8-10 Slides
Details: You and the VP of IT have been discussing your recommendations for a complete security program at Designer Distributions. You both realize that for these measures to be effective, the entire company staff will need both training and a commitment to make them work. The VP has asked you to prepare a presentation for the department managers describing the security awareness practices that the company will need to adopt to assure that the new program provides the security for which it is designed.

Create a PowerPoint presentation outlining those topics you think are important to emphasize in preparing the managers to inform their staff members and to gain their support and cooperation.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9202406

Have any Question?


Related Questions in Computer Engineering

Can someone show me a working implementation in c source

Can someone show me a working implementation, in C source code, of a Linux shell that will use shared memory for command execution using pipes that read data from the shared memory region? For example: you type ls -1 | w ...

Question suppose a new standard the iddd-643 standard is

Question Suppose a new standard, the IDDD-643 standard, is developed for storing numbers in a string of 16 bits. The first bit is used for the sign of the number (0 if positive and 1 if negative). The next 5 bits store t ...

Question the states of california arizona new mexico utah

Question : The States of California, Arizona, New Mexico, Utah, and Nevada each send a team of 6 delegates to the Sounth Western States annual conference. A sub commitee of 9 is to be formed to discuss water rights. How ...

What are information silos what are the problems caused by

What are information silos? What are the problems caused by information silos? How organizations can solve the problems caused by information silos?

Sorting program note make sure you use c programmingfor

Sorting Program Note: Make sure you use c++ programming For this assignment, you are to write a comparative algorithm that will compare the efficiency of three sorting routines. Here is the approach you should use: 1. Wr ...

Software reliability quality assurancequestion please refer

Software Reliability Quality Assurance Question please refer below Assume you work for an organisation that develops database products for individuals and small businesses. This organisation is interested in quantifying ...

Question what will be the source and destination ip

Question : What will be the source and destination IP addresses the response packet after the router forwards it to the private network? The response must be typed, single spaced, must be in times new roman font (size 12 ...

Question suppose we have the following context-free grammar

Question : Suppose we have the following context-free grammar which accepts a list of variable initializations. Goal ::= single | Goal single single ::= VAR "=" exp ";" exp ::= VAR | INT | exp + exp Here each V AR termin ...

Show the entries for the header of a udp user datagram that

Show the entries for the header of a UDP user datagram that carries a message from a TFTP client to a TFTP server. Fill the checksum field with zeros. Choose an appropriate ephemeral port number and the correct well-know ...

Subject digital securitybesides legal factors what are

Subject : Digital Security Besides legal factors, what are some of other important factors that need to be seriously considered when the cloud computing and service company(assuming) you work for decides to extend busine ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As