Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Using the South University Online Library or the Internet, research about the following:

Planning and implementing security for mobile computers and mobile devices

Planning and implementing a secure database

Verification testing for security mechanisms that are in place

Modify the report from W2 Assignment 2 to accommodate suggestions and recommendations from your instructor and your own changes based on the readings and activities for this week. Color code your changes to the report so that they are easy to identify.
Provide recommendations to secure the computers in the Marketing department of this organization. These computers travel outside of the network, so you need to consider how they will connect to the home server, and what should be done to protect them. You should consider the level of access they have to the network and the consequence if they are stolen or used by someone outside of the organization.

Provide recommendations for securing network traffic between the workstations within the building and the server. Identify trust boundaries for the organization and recommend security measures for each trust boundary. Characterize which trust boundaries represent the highest level of trust and those that represent the lowest; what is the distinction between these levels?

Recommend measures to harden the server OS to prevent outsiders from accessing the networked computers. Identify the services for your recommended OS that will aid in the security effort. Explain the policy that should be used for patches and updated on both the server and the workstation OSs. Why is this an important consideration?

Secure the database of the organization and assign the required permissions to the users. You should create a chart of groups and permissions for this portion of the assignment (you do not need to identify specific tables, just information groups).

Describe the implementation process and timeline for your recommendations. Try to give as reasonable a timeline as possible and explain the timeframe you choose.

Expand the section of your report for verifying the implementation of the previously suggested security recommendations from Week 1 and 2. Identify what is being tested for each verification activity and what is proven by each activity. This should include testing activities to make sure the security system is working properly. An example of this would be using an intentionally incorrect password to make sure the system does not allow the login.

Be sure to include your references and citations for the measures and activities you suggest. You should have gathered this from the research in the library or on the Internet.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M91383705
  • Price:- $45

Guranteed 36 Hours Delivery, In Price:- $45

Have any Question?


Related Questions in Management Information System

Questions what is your practical experience with physical

Questions : What is your practical experience with Physical Security Protocols? In your current job, what are the physical security protocols that you are required to follow and explain the one you find most annoying? Wh ...

Question determine the necessary service level agreements

Question : Determine the necessary Service Level Agreements (SLA) needed from your carrier services, along with the quality of service expectations required. Consider how the SLA will affect business and how you will mea ...

What is the standardized highly portable print job format

What is the standardized, highly portable print job format that is the default format used by the Windows 2000, Windows XP, and Windows Server 2003 print subsystems? What is the printing configuration that offers a singl ...

Case questions1describe the process from the customers

Case Questions 1. Describe the process (from the customer's perspective) of purchasing and obtaining office supplies through Staple's online / e-commerce channel using a process flow diagram. Your process diagram should ...

Questionnbsp - software patterns part 1 - pattern

Question  - Software Patterns Part 1 - Pattern Selection For the small case study provided, decide on an appropriate pattern or of patterns to support the requirements of that case study, and explain those decisions. Par ...

Deliverablesthis assessment is composed of the following

Deliverables This assessment is composed of the following two deliverable parts: Part 1 - Security Awareness Training Options Presentation Create a 4-6 slide PowerPoint presentation that outlines the options available fo ...

Research projecton march 11th 2011 stackoverflow made a

Research Project On March 11th, 2011, StackOverflow made a significant change to their leaderboard. They now show users with top reputation gained in the past week, rather than all-time high reputation users. The rationa ...

Question you are in charge of creating a new security

Question : You are in charge of creating a new security awareness policy for your organization or an organization you are familiar with. You are also to create a plan for training on this policy in this same organization ...

Team assignment team and team performance evaluation300

Team Assignment : Team and Team Performance Evaluation. 300 Words per each Topic and 2 references per topic 1) Present a discussion of what team is. What type(s) of team do you have in your organization? 2) What is meant ...

The head of the it security department expressed her

The head of the IT security department expressed her concerns about series of data breaches that occurred in the company and mentioned that many employees ignored their system security warnings. You have been asked to pr ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As