Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

Project Description

The project is to prepare a company Security Policy Document for an untrue company called Global Distribution, Inc. (GDI). A Security Policy Document is a completely necessary item for any organization that is subjected to a security audit. Lack of such a document will result in an automatic failed audit.  A Security Policy Document in an organization offers a high-level report of the various security controls the organization will use to protect its information and assets.  A characteristic Security Policy Document contains a large set of specific policies and can run several hundred pages.  Though, for this project, you will prepare a concise document with a maximum of 20 specific policies for GDI Company.  Thus, you should carefully consider and choose only the most significant policies from hundreds of probable specific policies.  A brief description of the GDI Company is given below. 

Suggested Approach

These are only recommendations on the general approach you may take for this project. 

1. Determine the most significant assets of company, which should be protected

2. Determine general security architecture for company

3. Determine real-time security measures which should be put in place

4. Determine the monitoring and preventative measures which should be put in place

5. Create a list of 15 to 20 specific policies which could be applied along with details and rationale for each policy

6. Integrate and prepare up final version of Security Policy Document for submittal

The GDI company explanation is deliberately concise.  In all real life projects, you typically add intricacy as you become smarter as you go along. State the assumptions/rationale you make to justify the selection of the specific security policies you select. Attach the assumptions/rationale to each specific security policy.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91630

Have any Question? 


Related Questions in Computer Engineering

1 can the value of the header length field in an ipv4

1. Can the value of the header length field in an IPv4 packet be less than 5? When is it exactly 5? 2. A host is sending 100 datagrams to another host. If the identification number of the first datagram is 1024, what is ...

1 igs need dc-ac ac-dc and ac-ac converters describe one

1. IGs need dc-ac, ac-dc, and ac-ac converters. Describe one application, relevant for IG-based energy system, for each of those power conversions. 2. Where are dc-dc converters used in IG systems?

The level of security in terms of the corresponding bit

The level of security in terms of the corresponding bit length directly influences the performance of the respective algorithm. We now analyze the influence of increasing the security level on the runtime. Assume that a ...

Hands-on project - honeybothoneybot is a simple honeypot

Hands-On Project - HoneyBOT HoneyBOT is a simple honeypot for beginners to use. Honeypots can give you a good idea of how many people are probing your machine for weaknesses. Without a honeypot, you may not be able to te ...

Consider a hash table of size 501 that contains 85 keysa

Consider a hash table of size 501 that contains 85 keys. (a) What is the load factor? (b) What is the average number of comparisons required to determine if the collection contains the key 73, if: i. linear probing is us ...

What is the total delay latency for a frame of size 5

What is the total delay (latency) for a frame of size 5 million bits that is being sent on a link with 10 routers each having a queuing time of 2 μs and a processing time of 1 μs. The length of the link is 2000 Km. The s ...

Choosenbspa company whose products you are familiar to use

Choose  a company whose products you are familiar to use as the example for this exercise. They must produce a tangible product. (No services allowed.) Must be a real company. Identify  the important attributes for your ...

Internetwrite one paragraph for each of the following

Internet Write one paragraph for each of the following questions: 1- What do you use the Internet for the most? What has the Internet made easier or more convenient for you in your lifetime? Can you identify some cons to ...

In the water-jug puzzle we are given a 3-liter jug named

In the water-jug puzzle, we are given a 3-liter jug, named Three and a 4-liter jug named Four. Initially, Three and Four are empty. Either jug can be filled with water from a tap, T, and we can discard water from either ...

Write a program that simulates an automatic teller machine

Write a program that simulates an Automatic Teller Machine (ATM). Since you probably don't have access to a card reader, have the initial screen ask for user id and a PIN. The user id will be used to look up the info for ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro