Premium Essay

# Lab 1 Creating an It Infrastructure Asset List and Identifying Where Privacy Data Resides

In:

Submitted By stonekiller117
Words 355
Pages 2
1. The purpose of identifying assets and inventory is so the value of the company can be accurately reflected. Assets and inventory need to be known for tax purposes. The organization must have detailed knowledge of what they need to protect.

2. The purpose of an asset classification is so that an organization can determine risk to its assets.

3. The e-commerce server might be considered a critical value because it might be what the company runs under and it the server crashes, everything including all customers’ purchases and transactions may be lost and that will cause a data leak, which will destroy the company.

4. Because these are things that can be damaging to not just an organization, but to individuals as well.

5. Some examples of security controls for recent compliance law requirements are tokens, smart cards, and biometrics.

6. You can properly classify what might normally be a low priority a high-risk classification because of the data that’s on it.

7. Frist setup securities policies and software to prevent SQL injection so the database can’t be compromised. Then have a schedule policy to keep the database to only be online when in use. Limited access to database, so only certain people can access.

8. In order to ensure the confidentiality of customer privacy data throughout the Mock IT infrastructure, both of the LANS and WANS must be overlooked and secured when it is connecting to multiple cities. This will ensure that there is a secure connection between all of the users and the corporation.

9. Your organization can document all previous types of risks, threats, and liabilities to ensure future protection that attacks in occurred in the past should not happen again. There will be more beefed up security measures because the organization will already know how to take care of the problem.

10. True

Similar Documents

Premium Essay

Company Security Policy

...------------------------------------------------- Rhombus, Inc. Company Security Policy Rev 1.1.15.12.4 Dec 2015 Editors: Rhombus, Inc. Policy Team 1 Rhombus, Inc. 14 1.1 About This Document 14 1.2 Company History 14 1.3 Company Structure and IT Assets 14 1.4 Industry Standards 15 1.5 Common Industry Threats 15 1.6 Policy Enforcement 16 2 Credit Card Security Policy 17 2.1 Introduction 17 2.2 Scope of Compliance 17 2.3 Requirement 1: Build and Maintain a Secure Network 17 2.4 Requirement 2: Do not use Vendor-Supplied Defaults for System Passwords and Other Security Parameters 18 2.5 Requirement 3: Protect Stored Cardholder Data 19 2.6 Requirement 4: Encrypt Transmission of Cardholder Data across Open and/or Public Networks 20 2.7 Requirement 5: use and Regularly Update Anti-Virus Software or Programs 20 2.8 Requirement 6: Develop and Maintain Secure Systems and Applications 21 2.9 Requirement 7: Restrict Access to Cardholder Data by Business Need to Know 21 2.10 Requirement 8: Assign a Unique ID to Each Person with Computer Access 22 2.11 Requirement 9: Restrict Physical Access to Cardholder Data 22 2.12 Requirement 10: Regularly Monitor and Test Networks 23 2.13 Requirement 11: Regularly Test Security Systems and Processes 25 2.14 Requirement 12: Maintain a Policy that Addresses Information Security for Employees and Contractors 26 2.15 Revision History 29 3 Acceptable Use Policy...

Words: 26545 - Pages: 107

Premium Essay

Vulnerability in Information

...CHAPTER 1 Vulnerabilities, Threats, and Attacks Upon completion of this chapter, you should be able to answer the following questions: ■ ■ What are the basics concepts of network security? What are some common network security vulnerabilities and threats? ■ ■ What are security attacks? What is the process of vulnerability analysis? Key Terms This chapter uses the following key terms. You can find the definitions in the glossary at the end of the book. Unstructured threats Structured threats External threats Internal threats Hacker Cracker Phreaker Spammer Phisher page 21 page 21 page 21 page 21 page 21 page 20 page 20 page 20 page 21 White hat Black hat page 21 page 21 page 28 page 28 Dictionary cracking Brute-force computation Trust exploitation Port redirection page 28 page 29 page 30 Man-in-the-middle attack Social engineering Phishing page 30 page 30 2 Network Security 1 and 2 Companion Guide The Internet continues to grow exponentially. Personal, government, and business applications continue to multiply on the Internet, with immediate benefits to end users. However, these network-based applications and services can pose security risks to individuals and to the information resources of companies and governments. Information is an asset that must be protected. Without adequate network security, many individuals, businesses, and governments risk losing that asset. Network security is the process by which digital information assets are...

Words: 13317 - Pages: 54

Premium Essay

Essentials of Management Information Systems

...Securing Information Systems LEARNING OBJECTIVES C H A P T E R 7 STUDENT LEARNING OBJECTIVES After completing this chapter, you will be able to answer the following questions: 1. Why are information systems vulnerable to destruction, error, and abuse? What is the business value of security and control? What are the components of an organizational framework for security and control? What are the most important tools and technologies for safeguarding information resources? 2. 3. 4. ISBN 1-256-42913-9 232 Essentials of MIS, Ninth Edition, by Kenneth C. Laudon and Jane P. Laudon. Published by Prentice Hall. Copyright © 2011 by Pearson Education, Inc. C HAPTER O UTLINE Chapter-Opening Case: Boston Celtics Score Big Points Against Spyware 7.1 System Vulnerability and Abuse 7.2 Business Value of Security and Control 7.3 Establishing a Framework for Security and Control 7.4 Technologies and Tools for Protecting Information Resources 7.5 Hands-on MIS Projects Business Problem-Solving Case: Are We Ready for Cyberwarfare? BOSTON CELTICS SCORE BIG POINTS AGAINST SPYWARE While the Boston Celtics were fighting for a spot in the playoffs several years ago, another fierce battle was being waged by its information systems. Jay Wessel, the team’s vice president of technology, was trying to score points against computer spyware. Wessel and his IT staff manage about 100 laptops issued to coaches and scouts, and sales, marketing, and finance employees, and these...

Words: 21009 - Pages: 85

Premium Essay

Paper

...Used under license from Shutterstock.com Production Technology Analyst: Tom Stover © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the publisher. For product information and technology assistance, contact us at Professional Group Cengage Learning Customer & Sales Support, 1-800-354-9706 For permission to use material from this text or...

Words: 229697 - Pages: 919

Premium Essay

Office of the National Coordinator for Health Information Technology (Onc)

...Individuals with Health IT to Improve their Health and the Health Care System Appendix A: Performance Measures Appendix B: Programs, Initiatives, and Federal Engagement Appendix C: HIT Standards and HIT Policy Committees Information Flow Appendix E: Statutes and Regulations Appendix F: Goals, Objectives, and Strategies Appendix G: Acronyms ONC Acknowledgements Notes 3 6 7 8 21 28 36 49 51 65 67 70 74 77 77 78 Goal V: Achieve Rapid Learning and Technological Advancement 43 Federal Health IT Strategic Plan 3 Introduction he technologies collectively known as health information technology (health IT) share a common attribute: they enable the secure collection and exchange of vast amounts of health data about individuals. The collection and movement of this data will power the health care of the future. Health IT has the potential to empower individuals and increase transparency; enhance the ability to study care delivery and payment systems; and ultimately achieve improvements in care, efficiency, and population health. However, these technologies – including electronic health records (EHRs), personal health records (PHRs), telehealth devices, remote monitoring technologies, and mobile health applications – are remarkably underutilized today. In 2010, only 25 percent of physician offices and 15 percent of acute care hospitals took advantage of EHRs. i...

Words: 36638 - Pages: 147

Premium Essay

Test Paper

...g Easier! Making Everythin ™ mputing Cloud Co Learn to: • Recognize the benefits and risks of cloud services • Understand the business impact and the economics of the cloud • Govern and manage your cloud environment • Develop your cloud services strategy Judith Hurwitz Robin Bloor Marcia Kaufman Fern Halper Get More and Do More at Dummies.com ® Start with FREE Cheat Sheets Cheat Sheets include • Checklists • Charts • Common Instructions • And Other Good Stuff! To access the Cheat Sheet created specifically for this book, go to www.dummies.com/cheatsheet/cloudcomputing Get Smart at Dummies.com Dummies.com makes your life easier with 1,000s of answers on everything from removing wallpaper to using the latest version of Windows. Check out our • Videos • Illustrated Articles • Step-by-Step Instructions Plus, each month you can win valuable prizes by entering our Dummies.com sweepstakes. * Want a weekly dose of Dummies? Sign up for Newsletters on • Digital Photography • Microsoft Windows & Office • Personal Finance & Investing • Health & Wellness • Computing, iPods & Cell Phones • eBay • Internet • Food, Home & Garden Find out “HOW” at Dummies.com *Sweepstakes not currently available in all countries; visit Dummies.com for official rules. Cloud Computing FOR DUMmIES ‰ Cloud Computing FOR DUMmIES ‰ by Judith Hurwitz, Robin Bloor, Marcia Kaufman, and Dr. Fern Halper Cloud Computing For Dummies® Published by Wiley Publishing...

Words: 96278 - Pages: 386

Premium Essay

Canhan

...except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc. 222 Rosewood Drive, Danvers, MA 01923, website www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030-5774, (201) 748-6011, fax (201) 748-6008, website www.wiley.com/go/permissions. To order books or for customer service please, call 1-800-CALL WILEY (225-5945). ISBN 978-0-470-34381-4 Printed in the United States of America 10 9 8 7 6 5 4 3 2 1 Preface Information technology and business are becoming inextricably interwoven. I don’t think anybody can talk meaningfully about one without the talking about the other.1 Bill Gates Microsoft I’m not hiring MBA students for the technology you learn while in school, but for your ability to learn...

Words: 175164 - Pages: 701

Premium Essay

Business and Management

...except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc. 222 Rosewood Drive, Danvers, MA 01923, website www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030-5774, (201) 748-6011, fax (201) 748-6008, website www.wiley.com/go/permissions. To order books or for customer service please, call 1-800-CALL WILEY (225-5945). ISBN 978-0-470-34381-4 Printed in the United States of America 10 9 8 7 6 5 4 3 2 1 Preface Information technology and business are becoming inextricably interwoven. I don’t think anybody can talk meaningfully about one without the talking about the other.1 Bill Gates Microsoft I’m not hiring MBA students for the technology you learn while in school, but for your ability to learn...

Words: 175164 - Pages: 701

Free Essay

Is4550 Unit 3 Assignment 1

...The  Critical  Security  Controls   for   Effective  Cyber  Defense   Version  5.0                     1       Introduction   .....................................................................................................................................................................  3   CSC  1:    Inventory  of  Authorized  and  Unauthorized  Devices  ............................................................................  8   CSC  2:    Inventory  of  Authorized  and  Unauthorized  Software  .......................................................................  14   CSC  3:    Secure  Configurations  for  Hardware  and  Software  on  Mobile  Devices,  Laptops,   Workstations,  and  Servers  .......................................................................................................................................  19   CSC  4:    Continuous  Vulnerability  Assessment  and  Remediation  .................................................................  27   CSC  5:    Malware  Defenses  ..........................................................................................................................................  33   CSC  6:    Application  Software...

Words: 31673 - Pages: 127

Premium Essay

Health Information System

...Slovensky 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 [First Page] [-1], (1) Lines: 0 to 27 * 516.0pt PgVar ——— ——— Normal Page * PgEnds: PageBreak [-1], (1) 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 AUPHA/HAP Editorial Board Sandra Potthoff, Ph.D., Chair University of Minnesota Simone Cummings, Ph.D. Washington University Sherril B. Gelmon, Dr.P.H., FACHE Portland State University Thomas E. Getzen, Ph.D. Temple University Barry Greene, Ph.D. University of Iowa Richard S. Kurz, Ph.D. Saint Louis University Sarah B. Laditka, Ph.D. University of South Carolina Tim McBride, Ph.D. St. Louis University Stephen S. Mick, Ph.D. Virginia Commonwealth University Michael A. Morrisey, Ph.D. University of Alabama—Birmingham Dawn Oetjen, Ph.D. University of Central Florida Peter C. Olden, Ph.D. University of Scranton Lydia M. Reed AUPHA Sharon B. Schweikhart, Ph.D. The Ohio State University Nancy H. Shanks, Ph.D. Metropolitan State College of Denver * [-2], (2 Lines: 2 59.41 ——— ——— Normal * PgEnds [-2], (2 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 [-3], (3) Lines: 115 to 168 * 487.0pt PgVar ——— ——— Normal Page * PgEnds: Eject [-3], (3) AUPHA Health Administration Press 1 2 3 4 5 6 7 8...

Words: 123678 - Pages: 495

Premium Essay

Mis Book

...permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc. 222 Rosewood Drive, Danvers, MA 01923, website www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030-5774, (201) 748-6011, fax (201) 748-6008, website www.wiley.com/go/permissions. To order books or for customer service please, call 1-800-CALL WILEY (225-5945). ISBN 978-0-470-34381-4 Printed in the United States of America 10 9 8 7 6 5 4 3 2 1 Preface Information technology and business are becoming inextricably interwoven. I don’t think anybody can talk meaningfully about one without the talking about the other.1 Bill Gates Microsoft I’m not hiring MBA students for the technology you learn while in...

Words: 175167 - Pages: 701

Premium Essay

Ibm Canada Ltd: Implementing Global Strategy

...IVEy Richard Ivey School of Business The University of Western Ontario 910E08 IBM CANADA LTD.: IMPLEMENTING GLOBAL STRATEGY Ken Mark wrote this case under the supervision of Professor Deborah R. Compeau solely to provide material for class discussion. The authors do not intend to iIIustrate either effective or ineffective handling of a managerial situation. The authors may have disguised certain names and other identifying information to protect confidentiality. Ivey Management Services prohibits any form of reproduction, storage or transmittal without its written permission. Reproduction of this material is not covered under authorizalion by any reproduction rights organizalion. To order copies or request permission to reproduce materials, contact Ivey Publishing, Ivey Management Services, e/o Richard Ivey School of Business, The University of Western Ontario, London, Onterio, Canada, N6A 3K7; phone (519) 661-3208; fax (519) 661-3882; e-mail cases@ivey.uwo.ca. Copyright © 2010, Ivey Management Services Version: (A) 2010-03-29 INTRODUCTION "Sorne managers are asking us to delay the switch from our locally supported CRM software to the new global application," said Peter Silvanovich, business transformation executive, Sales & Distribution, IBM Canada Ud. (IBM Canada). Silvanovich had responsibility for - among other things - introducing, maintaining and retiring software programs to support IBM Canada's business needs. On October 12, 2009, Silvanovich...

Words: 4578 - Pages: 19

Free Essay

Ebusiness

...electronic, mechanical, photocopying, recording or otherwise without the prior written permission of the publisher Permissions may be sought directly from Elsevier’s Science & Technology Rights Department in Oxford, UK: phone: (þ44) (0) 1865 843830; fax: (þ44) (0) 1865 853333; email: permissions@elsevier.com. Alternatively you can submit your request online by visiting the Elsevier website at http://www.elsevier.com/locate/ permissions, and selecting Obtaining permission to use Elsevier material British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library Library of Congress Cataloguing in Publication Data Control Number: 2005938727 ISBN–13: 978-0-7506-6731-9 ISBN–10: 0-7506-6731-1 For information on all Butterworth-Heinemann publications visit our website at http:/ /books.elsevier.com Printed and bound in The Netherlands 06 07 08 09 10 10 9 8 7 6 5 4 3 2 1 Contents Preface Acknowledgements Chapter 1 Introduction Key issues Defining e-business The development of the new economy Types of e-business and related industries The growth of e-business Use of the internet Key people Scope of the book Structure of the book Case studies References Chapter 2 E-business technology Key issues...

Words: 142464 - Pages: 570

Free Essay

Core Concepts of Ais

...Kamins Sarah Vernon Jacqueline Kepping Dorothy Sinclair Erin Bascom Karolina Zarychta Harry Nolan Wendy Lai Laserwords Maine Anna Melhorn Elle Wagner Greg Chaput Maciej Frolow/Brand X/Getty Images, Inc. This book was set in 10/12pt Garamond by Laserwords Private Limited, and printed and bound by RR Donnelley/Jefferson City. The cover was printed by RR Donnelley/Jefferson City. This book is printed on acid free paper. Founded in 1807, John Wiley & Sons, Inc. has been a valued source of knowledge and understanding for more than 200 years, helping people around the world meet their needs and fulfill their aspirations. Our company is built on a foundation of principles that include responsibility to the communities we serve and where we live and work. In 2008, we launched a Corporate Citizenship Initiative, a global effort to address the environmental, social, economic, and ethical challenges we face in our business. Among the issues we are addressing are carbon impact, paper specifications and procurement, ethical conduct within our business and among our vendors, and community and...

Words: 241803 - Pages: 968

Premium Essay

Human Resoucre

...HR THE INTERNATIONAL UNIVERSITY OF MANAGEMENT WINDHOEK-NAMIBIA STUDY MANUAL INFORMATION MANAGEMENT SYSTEMS CODE: BIS - 3315 TABLE OF CONTENTS CHAPTER PAGE NUMBER 1. WHY INFORMATION SYSTEMS………………………………………….6 2. Strategic role of information systems…………………..21 3. Information systems in organizations…………………..26 4. Computer and information processing…………………42 5. Managing data resources………………………………………..60 6. Networking and information systems…………………..81 7. Systems development…………………………………………………90 8. Implementation of information systems……………….97 9. Managing knowledge……………………………………………….106 10. Decision support systems………………………………………….129 THE STRUCTURE OF THIS STUDY MODULE The Module has margin icons that show the student the objectives, activities, in-text questions, feedback, further reading, key words and terms, stop and reflex signs. Chapter One covers the importance of Information Systems in running today’s organizations. Chapter Two looks at the strategic role played by information systems in today’s organizations. Chapter Three focuses on the impact of Information Systems on the organizational structure and how information systems help managers improve their decision making. Chapter Four looks at the hardware and software requirements for organizations to be able to implement information systems structures Chapter Five looks at the traditional file environments and the rise of the database...

Words: 43854 - Pages: 176