Premium Essay

Is4550 Lab 9

In:

Submitted By blcasteel
Words 616
Pages 3
Risk-Threat-Vulnerability IT Security Policy Definition
Unauthorized access from Public Internet Acceptable Us Policy
User Destroys Data in application and deletes all files Asset Identification and Classification Policy
Hacker penetrates you IT infrastructure and gains access to your internal network Vulnerability Assessment and Management Policy
Intra-office employee romance gone bad Security Awareness Training Policy
Fire destroys primary data center Threat Assessment and Management policy communication circuit outages Asset Protection Policy
Workstation OS has a known software vulnerability Vulnerability Assessment and Management Policy
Unauthorized access to organization owned Workstations Asset Management Policy
Loss of production data Security Awareness Training Policy
Denial of service attack on organization e-mail server Vulnerability Assessment and Management Policy
Remote communications from home office Asset Protection Policy
LAN server OS has a known software vulnerability Vulnerability Assessment and Management Policy
User downloads an unknown e-mail attachment Security Awareness Training Policy
Workstation browser has software vulnerability Vulnerability Assessment and Management Policy
Service provider has a major network outage Asset Protection Policy
Weak ingress/egress traffic filtering degrades performance Vulnerability Assessment and Management Policy
User inserts CDs and USB hard drives with personal photos, music, and video's Security Awareness Training Policy
VPN tunneling between remote computer and ingress/egress router Vulnerability Assessment and Management Policy
WLAN access points are needed for LAN connectivity within a warehouse Asset Identification and Classification Policy
Need to prevent rogue users from unauthorized WLAN access Vulnerability Assessment and Management Policy

Similar Documents

Free Essay

Game Vending Machine

...Use Case Description for Acme Video Game Vending Machine System Created by: Quang Tran Date: Oct 11, 2014 Use Case Name: Rent a Game Scenario: Customers rent and return games. Triggering Event: Customers use their Debit/Credit card for games rental, which is charged by Acme’s Bank. Brief Description: Customers enter requirement information and swipe a valid card for games rental. Actors: Customers, Acme’s Bank, and Central computer system of Acme headquarters. Related Use Cases: None. Stakeholders: Security department. Preconditions: System is in stand by mode and ready to perform. Postconditions: System is in performance mode (1 or 2 minutes) before turn to stand by mode. Flow of Events: Actor System 1. Customers choose games through vending machine 2. Customers enter information and pay by a valid card. 3. Acme’s Bank check and charge for rental 4. Acme’s computer system organizes and save customers’ information. 5. Customers return games at vending machine. 6. Customer received a receipt and additional charge via e-mail. 1. Acme’s bank is received customers’ information from vending machine. 2. Acme’s computer system is received customers’ information from vending machine. 3. Vending machine dispended games after customers’ information are approved. 4. Machine received returned games from customers. 5. Information sent to Acme’s bank and Acme’s central computer system. 6. A receipt e-mail to customers for a final charge. Exception...

Words: 260 - Pages: 2

Premium Essay

Cda Tab B

...outdoor activity) RC II-6     Self Concept RC II-7     Emotional Skills/Regulation RC II-8     Social Skills RC II-9     Mathematics Age Group: Preschool 4-5yrs | | | | | RC II | Description: | Intended Goals: | Materials: | Teaching Process: | 1     Science/Sensory | | | | | 2     Language and Literacy | | | | | 3     Creative Arts | | | | | 4     Fine Motor (choose an indoor activity) | Making a necklace: Threading beads on a precut piece of yarn. | Threading at least 10 beads on precut piece of yarn. | Precut yarnSeveral colorful big beads for 3-5yr already in small containers per child | Pre-made necklace for example.Show & tell work. Hold yarn and place bead on yarn.Then continue activity with children. | 5     Gross motor (choose an outdoor activity) | Playing Sam Says, which is the same as Simon says. | To follow directions of what Ms. Sam is saying to do and to listen careful because I will try to trick them. | Open space and Myself. | First, space the children out to give each arm room. 2ndly, I will explain the game and show example. Ex: Ms. Sam says touch your ear and I touch my ear. Then I say Ms. Sam rub her head and I rub my head and I say stop but I keep rubbing my head because I didn’t say Ms. Sam… | 6     Self Concept | | | | | 7     Emotional Skills/Regulation | | | | | 8     Social Skills | | | | | 9     Mathematics | | | | |...

Words: 263 - Pages: 2

Premium Essay

Informative

...IS4550 Security Policies and Implementation INSTRUCTOR GUIDE Course Revision Table Change Date | Updated Section | Change Description | Change Rationale | Implementation Quarter | 12/20/2011 | All | New curriculum | | June 2012 | | | | | | | | | | | | | | | | | | | | | | | | | | ------------------------------------------------- ------------------------------------------------- Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory, 30 Lab) Prerequisite: IS3110 Risk Management in Information Technology Security or equivalent Corequisite: None Table of Contents Course Overview 5 Course Summary 5 Critical Considerations 5 Instructional Resources 6 Required Resources 6 Additional Resources 6 Course Management 8 Technical Requirements 8 Test Administration and Processing 8 Replacement of Learning Assignments 9 Communication and Student Support 9 Academic Integrity 10 Grading 11 Course Delivery 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 Unit Plans 15 Unit 1: Information Security Policy Management 15 Unit 2: Risk Mitigation and Business Support Processes 25 Unit 3: Policies, Standards, Procedures, and Guidelines 33 Unit 4: Information Systems Security Policy Framework 42 Unit 5: User Policies 50 Unit 6: IT Infrastructure Security Policies 58 Unit 7: Risk Management 66 Unit 8: Incident Response Team Policies 74 Unit 9: Implementing...

Words: 18421 - Pages: 74

Premium Essay

Test

...ITT Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110...

Words: 2305 - Pages: 10