Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

Project Description

The project is to prepare a company Security Policy Document for an untrue company called Global Distribution, Inc. (GDI). A Security Policy Document is a completely necessary item for any organization that is subjected to a security audit. Lack of such a document will result in an automatic failed audit.  A Security Policy Document in an organization offers a high-level report of the various security controls the organization will use to protect its information and assets.  A characteristic Security Policy Document contains a large set of specific policies and can run several hundred pages.  Though, for this project, you will prepare a concise document with a maximum of 20 specific policies for GDI Company.  Thus, you should carefully consider and choose only the most significant policies from hundreds of probable specific policies.  A brief description of the GDI Company is given below. 

Suggested Approach

These are only recommendations on the general approach you may take for this project. 

1. Determine the most significant assets of company, which should be protected

2. Determine general security architecture for company

3. Determine real-time security measures which should be put in place

4. Determine the monitoring and preventative measures which should be put in place

5. Create a list of 15 to 20 specific policies which could be applied along with details and rationale for each policy

6. Integrate and prepare up final version of Security Policy Document for submittal

The GDI company explanation is deliberately concise.  In all real life projects, you typically add intricacy as you become smarter as you go along. State the assumptions/rationale you make to justify the selection of the specific security policies you select. Attach the assumptions/rationale to each specific security policy.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91630

Have any Question? 


Related Questions in Computer Engineering

This exercise examines deterministic packet selection

This exercise examines deterministic packet selection. Assume that the packet header contains spaces for routers to enter their IP addresses. a. Suppose the header contains space for 30 router addresses. Initially, these ...

Descriptionthis assignment will provide you with practice

Description This assignment will provide you with practice using arrays. Your job is to build a simple Recommender System, similar to the one that Netflix (an online movie-rental service) uses to recommend movies to cust ...

Write a windows application that allows the user to explore

Write a Windows application that allows the user to explore the knapsack problem. The user should be able to change the capacity of the knapsack, the sizes of the items, and the values of the items. The user should also ...

Hadco construction preventive maintenance strategyhadco

HADCO Construction Preventive Maintenance Strategy Hadco Construction is a major contractor for large-scale residential, commercial and government projects.  It operates a fleet of heavy duty construction equipment, for ...

Assignmenttopic the effect of virtual achievements on

Assignment Topic :The Effect of Virtual Achievements on Student Engagement For this task, I need help in developing a narrative about my topic (above), and an outline of the collegiate dissertation process, to submit for ...

Why do you suppose so much planning needs to occur before

Why do you suppose so much planning needs to occur before installation of the Linux OS?

Designing a model assume that you have been asked by the

Designing a model Assume that you have been asked by the city council to build an agent-based model of transportation patterns in the city. In particular they are interested in seeing where they should spend money with t ...

Network design proposal part cmit 265 fundamentals of

Network Design Proposal Part CMIT 265 Fundamentals of Networking In this section, address each of the following. Identify network services needed. List additional servers or network devices needed to implement the networ ...

Implement a tree search algorithm that employs a sentinel

Implement a tree search algorithm that employs a sentinel as described in note 5. Assume that the tree has been set up so that the sentinel node exists but has not been set.

Circle intersection write a program that computes the

Circle Intersection. Write a program that computes the intersection of a circle with a horizontal line and displays the information textually and graphically. Input: Radius of the circle and the y-intercept of the line O ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro