Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

Project Description

The project is to prepare a company Security Policy Document for an untrue company called Global Distribution, Inc. (GDI). A Security Policy Document is a completely necessary item for any organization that is subjected to a security audit. Lack of such a document will result in an automatic failed audit.  A Security Policy Document in an organization offers a high-level report of the various security controls the organization will use to protect its information and assets.  A characteristic Security Policy Document contains a large set of specific policies and can run several hundred pages.  Though, for this project, you will prepare a concise document with a maximum of 20 specific policies for GDI Company.  Thus, you should carefully consider and choose only the most significant policies from hundreds of probable specific policies.  A brief description of the GDI Company is given below. 

Suggested Approach

These are only recommendations on the general approach you may take for this project. 

1. Determine the most significant assets of company, which should be protected

2. Determine general security architecture for company

3. Determine real-time security measures which should be put in place

4. Determine the monitoring and preventative measures which should be put in place

5. Create a list of 15 to 20 specific policies which could be applied along with details and rationale for each policy

6. Integrate and prepare up final version of Security Policy Document for submittal

The GDI company explanation is deliberately concise.  In all real life projects, you typically add intricacy as you become smarter as you go along. State the assumptions/rationale you make to justify the selection of the specific security policies you select. Attach the assumptions/rationale to each specific security policy.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91630

Have any Question? 


Related Questions in Computer Engineering

1 how does a cast such as bankaccount x differ from a cast

1. How does a cast such as (BankAccount) x differ from a cast of number values such as (int) x? 2. The classes Rectangle2D.Double, Ellipse2D.Double, and Line2D.Double implement the Shape interface. The Graphics2D class d ...

An isp is granted the block 807056021 the isp needs to

An ISP is granted the block 80.70.56.0/21. The ISP needs to allocate addresses for two organizations each with 500 addresses, two organizations each with 250 addresses, and three organizations each with 50 addresses. a. ...

We have talked a lot about designing models but we have

We have talked a lot about designing models, but we have assumed so far that you know what the level of complexity of your model will be. Is there always an appropriate level of complexity of an agent-based model? Discus ...

1 in a tcp connection the window size fluctuates between

1. In a TCP connection, the window size fluctuates between 60,000 bytes and 30,000 bytes. If the average RTT is 30 ms, what is the throughput of the connection? 2. If originally RTTS = 14 ms and α is set to 0.2, calculat ...

A click counter is a small hand-held device that contains a

A click counter is a small hand-held device that contains a push button and a count display. To increment the counter, the button is pushed and the new count shows in the display. Clicker counters also contain a button t ...

One of the earlier applications of cryptographic hash

One of the earlier applications of cryptographic hash functions was the storage of passwords for user authentication in computer systems. With this method, a password is hashed after its input and is compared to the stor ...

Design an algorithm that makes the following exchangethe

Design an algorithm that makes the following exchange: The arrows indicate that b is to assume the value of α, c the value of b, and so on.

Internet technology project executiion ip3project execution

Internet Technology Project Executiion IP3 Project Execution IP3 Unit: Project Execution Deliverable Length: New content of 3-4 pages All sources should be cited both in-text and in References using APA format; with supp ...

Create a cloud of turtles half of them one color and half

Create a " cloud " of turtles, half of them one color and half of them another color. Based on a probability have one color of turtles move up and the other color turtles move down. Label the turtles with their WHO numbe ...

Design and implement the bstbuild function which takes a

Design and implement the bstBuild() function, which takes a sequence of keys and builds a new search tree from those keys. For example, the function could be used to build the binary search tree in Figure 14.5.

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen