Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

Project Description

The project is to prepare a company Security Policy Document for an untrue company called Global Distribution, Inc. (GDI). A Security Policy Document is a completely necessary item for any organization that is subjected to a security audit. Lack of such a document will result in an automatic failed audit.  A Security Policy Document in an organization offers a high-level report of the various security controls the organization will use to protect its information and assets.  A characteristic Security Policy Document contains a large set of specific policies and can run several hundred pages.  Though, for this project, you will prepare a concise document with a maximum of 20 specific policies for GDI Company.  Thus, you should carefully consider and choose only the most significant policies from hundreds of probable specific policies.  A brief description of the GDI Company is given below. 

Suggested Approach

These are only recommendations on the general approach you may take for this project. 

1. Determine the most significant assets of company, which should be protected

2. Determine general security architecture for company

3. Determine real-time security measures which should be put in place

4. Determine the monitoring and preventative measures which should be put in place

5. Create a list of 15 to 20 specific policies which could be applied along with details and rationale for each policy

6. Integrate and prepare up final version of Security Policy Document for submittal

The GDI company explanation is deliberately concise.  In all real life projects, you typically add intricacy as you become smarter as you go along. State the assumptions/rationale you make to justify the selection of the specific security policies you select. Attach the assumptions/rationale to each specific security policy.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91630

Have any Question? 


Related Questions in Computer Engineering

What are the parts or features of cobits maturity model

What are the parts or features of COBIT's maturity model? What are the five levels of the model, and what do they signify?

Given that the internet is a shared network discuss whether

Given that the Internet is a shared network, discuss whether preventing denial of service attacks is inherently possible or not possible. Do systems connected to the Internet violate the principle of least common mechani ...

1 explain why adding a switch makes the network perform

1) Explain why adding a switch makes the network perform better in terms of throughput and delay. 2) We analyzed the collision counts of the hubs. Can you analyze the collision count of the"switch"? Explain your answer.

1 what is the purpose of a translation lookaside buffer2

1. What is the purpose of a translation lookaside buffer? 2. Briefly define the alternative page fetch policies. 3. What is the difference between resident set management and page replacement policy? 4. What is the relat ...

Identify and discuss the market segmentation approaches you

Identify and discuss the market segmentation approaches you believe are most relevant for Subaru. Why are these important to the marketing strategy for Subaru's product offerings?

1 what is the goal of query optimization why is it

1. What is the goal of query optimization? Why is it important? 2. Describe the advantages of pipelining. 3. Give an example in which pipelining cannot be used. 4. Describe the iterator interface and explain its advantag ...

A explain one more time the three ways that databases

a. Explain, one more time, the three ways that databases arise. b. Describe why database redesign is necessary.

In the process of simplifying a radical expression an

In the process of simplifying a radical expression, an individual provides a decimal number as an answer. Is the individual's answer correct? Why or why not? Explain your answer.

What methods and means are available for requirement

What methods and means are available for requirement gathering? What is the process flow for requirement development? What quality control mechanism can be employed during requirement development and management? Why is r ...

A recent report highlighted that the main measure of

A recent report highlighted that the main measure of performance used by the majority of purchasing organisations was reduced costs.Propose other sets of performance measures that could be applied by purchasing organisat ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

A cola-dispensing machine is set to dispense 9 ounces of

A cola-dispensing machine is set to dispense 9 ounces of cola per cup, with a standard deviation of 1.0 ounce. The manuf

What is marketingbullwhat is marketing think back to your

What is Marketing? • "What is marketing"? Think back to your impressions before you started this class versus how you

Question -your client david smith runs a small it

QUESTION - Your client, David Smith runs a small IT consulting business specialising in computer software and techno

Inspection of a random sample of 22 aircraft showed that 15

Inspection of a random sample of 22 aircraft showed that 15 needed repairs to fix a wiring problem that might compromise

Effective hrmquestionhow can an effective hrm system help

Effective HRM Question How can an effective HRM system help facilitate the achievement of an organization's strate