Premium Essay

Operation Richman’s Company It Network

In:

Submitted By
Words 2271
Pages 10
Richman Company’s, Final Project
“Corey Networks”
Situation: Operation Richman’s Company
You are a networking security intern at Richman. You have asked to submit a proposal to Richman senior management. In the proposal, you must choose to address seven of the following and relate it to the appropriate SSCP domains:
Issue one. Based on the premise that Richman has 5,000 employees throughout the main office and several branch offices, you must research solutions and detail the appropriate access controls including policies, standards, and procedures that define who users are, what they can do, which resources they can access, and which operations they can perform on a system.
Issue two. Based on the premise that most of the managers have BlackBerry devices for instant communications and all employees are provided cell phones, you must research and detail the cryptography methods to protect organizational information using techniques that ensure its integrity, confidentiality, authenticity, and non-repudiation, and the recovery of encrypted information in its original form.
Issue three. Based on the premise that there is a mix of computer running Windows 2000, Windows XP, Windows Vista, Windows 7, and Mac OS X, you must research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses, and other related forms of intentionally created deviant code.
Issue four. You must research and formulate a plan to implement monitoring and analysis based on the premise that all employees have Internet access to browse the Web, there is no policy on the use of removable media, and several of the branch offices have encountered issues with malware recently. You must determine system implementation and access in accordance with defined IT criteria as well as

Similar Documents

Free Essay

Iss Project

...purpose of this policy is to set out Richman’s approach to openness but also to recognise the importance of respecting confidentiality. It is important for Richman to demonstrate openness and accountability and a real commitment to providing opportunities for stakeholders to be involved in or influence decision making, and to uphold the principles and practice of equality and best value. Richman believes it is important to promote the aims, values and activities of the organisation to a wider public and be accountable to our stakeholders. Richman is committed to the principles of sustainability and will endeavour to develop fair and consistent policies, procedures and practices. 2. General Principles All employees and Committee Members are required to comply with this policy. Richman will comply with all relevant legislation in applying this policy. For the purposes of this policy, stakeholders are people or organisations with a direct involvement and interest in the operation and performance of Richman. The main stakeholders include: * Members; * Branches * Individuals who receive a service from Richman; * Local communities; * Local authorities; * Other partner organisations; * Employees; * Funders; * Regulators. This is not an exhaustive list. Action Plan The Information Technology Department will have an action plan in case of an emergency or natural disaster. Richman’s IT Department has negotiated a...

Words: 1140 - Pages: 5

Premium Essay

Remote Access Control Policy Definition

...Remote access security policy involves the policies and conditions that are in place that allow users to connect to servers when out of the network. In the case of Richman industries, they are interested in maintaining connections with their users, and sharing app data that is on a server for their day to day operations. In their case, I would have access policy that is based on Explicit Allow policies. This means that the policy grants “Permission” to access the servers remotely if the connection attempt matches the policy conditions. Some of the requirements would include strict control enforced via one-time password authentication or public keys with strong pass-phrases. Also, anyone trying to gain access must not be connected to any other network at the same time, aside from personal home networks under the user's complete control. Further, employees with access must not use email accounts other than the company's standards, so that personal use won't be confused with business. Users must have approved virus control and spyware protection in place on all devices accessing the company network. Remote access will be limited in certain areas, while at least Applications will be approved for access (Shared application data is an important part of Richman’s network). Systems and system settings will not be accessible from remote, out of network connections, to protect from outside alterations of systems or system settings, and any Data access will be read only, with safeguards in...

Words: 300 - Pages: 2

Free Essay

Influencial Factor of Accounting

...CHAPTER 2 ENRIRONMENTAL INFLUENCE ON ACCOUNTING DEVELOPMENT 1 2.1 Introduction In international accounting research, environmental influence is the key to understanding one country’s accounting system. "To a large extent, accounting is a product of its environment. That is, it is shaped by, reflects, and reinforces particular characteristics unique to its national environment" (Radebaugh and Gray 1997). From the late 1960s, researchers in international accounting have tried to categorize countries according to a series of criteria, which have been developed on a deductive or conductive basis. These criteria tried to explain the reasons for accounting differences between countries; they aimed to describe and compare different systems with each other in an efficient way. There are several advantages to categorize and analyze the differences among countries: First, it promotes improved understanding of the complex realities of accounting practices, as well as the factors that shape a country’s accounting regulations; Second, it provides useful information for solving some of the important accounting problems that exist in the world. For example, it can help policymakers assess the prospects and problems of international harmonization; Third, it can assist in the training of accountants and auditors who operate internationally; And finally, it can enable a developing country to better understand the available and appropriate types of financial...

Words: 17162 - Pages: 69

Free Essay

Wipro

...October 2011: 1 | | Cabinet approves Bill to share mining profits | * Mines and Mineral Development and Regulation (MMDR) Bill, 2011 * Provides for mining companies to keep aside 26% of their net profits for a Mineral Development Fund to be used for development and rehabilitation of project-affected people in the tribal areas of the country * For the non-coal companies, amount will be equivalent to the royalty they pay * Appointed a regulatory body for overseeing the functioning of the mining sector and measures to tackle illegal mining | Maoist problem in West Bengal | * In Jangalmahal region of West Bengal * Maoists: Operations by security forces and peace talks cannot go together. | Yasin Malik's arrest sparks protests | * After police detained JKLF chairman Mohammad Yasin Malik for taking out a rally against the death sentence awarded to Afzal Guru | Court allows export of unused endosulfan | * SC has allowed the export of unused stock of endosulfan. * But the ban on use and production of the pesticide will continue | FDI in beekeeping | * GOI allowed 100 per cent FDI in beekeeping, also known as ‘apiculture' under automatic route * Other areas in which the permission has already been given: * Plantation * Horticulture * Seeds * Cultivation of vegetables and mushrooms * Animal husbandry * Pisciculture * Aquaculture | 2 | | Neelima's application for visa rejected | * American Consulate in Mumbai rejected Magsaysay...

Words: 37383 - Pages: 150