Premium Essay

Project Part 1 Task 1: Outline Security Policy Scenario

In:

Submitted By mozurjus
Words 780
Pages 4
Project Part 1 Task 1: Outline Security Policy Scenario
To stay competitive in the financial institution market, the First World Bank Savings and Loan wishes to provide all banking services online to its customers. These services also include the online use of credit cards for loan applications. The organization estimates over $100,000,000 a year in online credit card transactions for loan applications and other banking services.
A task team has been formed to study the cost, performance, and security of maintaining a Linux and open source infrastructure. According to rough estimates, annual cost savings in licensing fees alone can be up to $4,000,000. At the same time, the confidentiality, integrity, and availability (CIA) triad perspective needs to be taken into account for infrastructure maintenance.
The task team has engaged a network engineer with the network and routing design. The team has determined the following server services that would be needed to support the online transaction infrastructure: * A database server * A Web server * A file server * A Simple Mail Transfer Protocol (SMTP) server * A Lightweight Directory Access Protocol (LDAP) server
All servers would be physically located in a third-party data center.
Tasks
You need to:
Understand the business need of First World Bank Savings and Loan. Point out specific legislation and regulations that meet the statutory compliance criteria. Assess the feasibility of Linux and open source infrastructure in handling security demands listed by the legislation and regulations. Make recommendations to model a tiered architecture for the proposed online transaction in a Linux-based infrastructure. Identify a suitable security framework that forms the basis of your recommended security policy, providing a valid rationale for your recommendation. Create a professional summary

Similar Documents

Premium Essay

Testy

...Purpose This project provides you an opportunity to analyze risks, threats, and vulnerabilities and apply countermeasures in the information systems environment. Required Source Information and Tools ------------------------------------------------- Web References: Links to Web references are subject to change without prior notice. These links were last verified on June 12, 2014. To complete the project, you will need the following: 1. Access to the Internet to perform research for the project * Microsoft Windows How-To, including: * Optimize Windows for Better Performance: http://windows.microsoft.com/en-us/windows/optimize-windows-better-performance - optimize-windows-better-performance=windows-7 * Monitor Attempts to Access and Change Settings On Your Computer / To Turn On Auditing: http://windows.microsoft.com/en-us/windows7/monitor-attempts-to-access-and-change-settings-on-your-computer * What Information Appears in Event Logs? http://windows.microsoft.com/en-us/windows/what-information-event-logs-event-viewer - 1TC=windows-7 2. Course textbook Learning Objectives and Outcomes You will: * Explain how to assess risks, threats, and vulnerabilities * Evaluate potential outcomes of a malware attack and exposure of confidential information * Evaluate information systems security countermeasures * Explain how system hardening relates to a company’s IT security policy framework * Analyze the purposes...

Words: 1575 - Pages: 7

Premium Essay

Drew

...Syllabus NT2799 Network Systems Administration Capstone Project SYLLABUS Credit hours: 4.5 Contact hours: 56 (34 Theory, 22 Lab) Prerequisite(s): Completion of a minimum of 72 credits earned in the program of study including NT2640 IP Networking or equivalent. © ITT Educational Services, Inc. All Rights Reserved. -1- 13/01/2013 Network Systems Administration Capstone Project SYLLABUS COURSE SUMMARY COURSE DESCRIPTION This course provides an opportunity for students to work on a comprehensive project that includes the design, planning and implementation of a network solution for solving specific business problems. Common project management processes are applied to identify deliverables and outcomes of the project. MAJOR INSTRUCTIONAL AREAS 1. Project Management Techniques 2. A Fundamental Review of the Basics of Electronics in the AASNSA Program 3. Capstone Project 4. Research of Current and Emerging Technology COURSE OBJECTIVES 1. Apply important concepts of project management to the actual capstone project proposed for this course. 2. Use Microsoft Office Project to help plan and manage the actual capstone project. 3. Analyze the requirements for the capstone project. 4. Integrate and apply the knowledge acquired in the program to provide effective technological solutions for given problems. 5. Work in teams on a large-scope project. 6. Document solutions to a problem in detail by applying...

Words: 7871 - Pages: 32

Premium Essay

Jadm 430 Complete Course - Devry ( All Assignments - Dqs and Midterm Exam)

...Purchase A+ Work Then Click The Link Below , Instant Download http://acehomework.com/JADM-430-Complete-Course-DeVry-1211112.htm?categoryId=-1 If You Face Any Problem E- Mail Us At JohnMate1122@gmail.com Course Project: Managing the Prison Environment Objectives Back to Top The Course Project is designed to provide you with an opportunity to research a topic of interest related to some aspect of correctional administration. This project is an effort to allow you to fully explore issues related to either correctional officials or prison inmates. This project incorporates all TCOs. Guidelines Back to Top The course project is worth 320 total points and will be graded on APA formatting; quality of research topic; quality of paper information; proper use of text citations; proper grammar, punctuation, usage, and sentence structure; and the deliverable components for Weeks 1, 2, 5, and 6. There are four components to the Course Project. • title page, topic discussion, and a list of three references • annotated outline • annotated bibliography • Final Paper Requirements • APA guidelines must be followed for all course component deliverables. • At least six authoritative, outside references are required for the annotated bibliography and the Final Paper. • All DeVry University policies are in effect, including the plagiarism policy. • The Final Paper isdue in Week 6of this course. • The Final Paper must be 8 to 10 pages of text in length, Times New Roman 12-point...

Words: 3664 - Pages: 15

Premium Essay

Risk, Threats, and Vulnerabilties

...Purpose This project provides you an opportunity to analyze risks, threats, and vulnerabilities and apply countermeasures in the information systems environment. Required Source Information and Tools To complete the project, you will need the following: 1. Access to the Internet to perform research for the project * Microsoft Windows How-To, including: * Optimize Windows for Better Performance: http://windows.microsoft.com/en-us/windows/optimize-windows-better-performance - optimize-windows-better-performance=windows-7 * http://windows.microsoft.com/en-us/windows-8/improve-performance-optimizing-hard-drive 8.1 * http://www.makeuseof.com/tag/7-quick-tips-hacks-optimize-windows-10-experience/ win 10 * Monitor Attempts to Access and Change Settings On Your Computer / To Turn On Auditing: http://windows.microsoft.com/en-us/windows7/monitor-attempts-to-access-and-change-settings-on-your-computer * What Information Appears in Event Logs? http://windows.microsoft.com/en-us/windows/what-information-event-logs-event-viewer - 1TC=windows-7 2. Course textbook Learning Objectives and Outcomes You will: * Explain how to assess risks, threats, and vulnerabilities * Evaluate potential outcomes of a malware attack and exposure of confidential information * Evaluate information systems security countermeasures * Explain how system hardening relates to a company’s IT security policy framework ...

Words: 665 - Pages: 3

Premium Essay

Meow Investments Meow Documents

...Unit Plans Unit 1: Information Systems Security Fundamentals Learning Objective  Explain the concepts of information systems security (ISS) as applied to an IT infrastructure. Key Concepts  Confidentiality, integrity, and availability (CIA) concepts  Layered security solutions implemented for the seven domains of a typical IT infrastructure  Common threats for each of the seven domains  IT security policy framework  Impact of data classification standard on the seven domains Reading  Kim and Solomon, Chapter 1: Information Systems Security. Keywords Use the following keywords to search for additional materials to support your work:  Data Classification Standard  Information System  Information Systems Security  Layered Security Solution  Policy Framework ------------------------------------------------- Week 1 Assignment (See Below) * Match Risks/Threats to Solutions * Impact of a Data Classification Standard Lab * Perform Reconnaissance & Probing Using ZenMap GUI (Nmap) * Page 7-14 in lab book. Project (See Below) * Project Part 1. Multi-Layered Security Plan ------------------------------------------------- Unit 1 Assignment 1: Match Risks/Threats to Solutions Learning Objectives and Outcomes  You will learn how to match common risks or threats within the seven domains of a typical IT infrastructure with solutions and preventative actions...

Words: 1409 - Pages: 6

Premium Essay

Information Security Policy

...are the effects of international trade to GDP, domestic markets and university students?University of Phoenix IT/244 Intro to IT Security Instructor’s Name: Date: 03/25/12 Table of Contents 1. Executive Summary 1 2. Introduction 1 3. Disaster Recovery Plan 1 3.1. Key elements of the Disaster Recovery Plan 1 3.2. Disaster Recovery Test Plan 1 4. Physical Security Policy 1 4.1. Security of the facilities 1 4.1.1. Physical entry controls 1 4.1.2. Security offices, rooms and facilities 1 4.1.3. Isolated delivery and loading areas 2 4.2. Security of the information systems 2 4.2.1. Workplace protection 2 4.2.2. Unused ports and cabling 2 4.2.3. Network/server equipment 2 4.2.4. Equipment maintenance 2 4.2.5. Security of laptops/roaming equipment 2 5. Access Control Policy 2 6. Network Security Policy 3 7. References 3 Executive Summary Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario. This new strategy guide for Bloom Design Group provides a comprehensive strategy for providing a safe and secure work environment. Several new policies and procedures will be implemented as a result of these new ideas. Bloom Design Group will have little trouble in adhering to the promised...

Words: 3916 - Pages: 16

Premium Essay

Is4799 Capstone

...Systems and Cyber-security Capstone Project) A COMPREHENSIVE PROJECT SUBMITTED TO THE INFORMATION SYSTEMS SECURITY PROGRAM IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE BACHELOR’S DEGREE by Jorge Perez ITT TECHNICAL INSTITUTE Miami, Florida September, 2015 Unit 1 Phased Project Approach and High Level Project Plan Outline Our current status is great but, we are need to do some changes in in order to fulfill the request. Since we only have 22 employees and it is necessary that we will move within the next 3 weeks, there are few thing needed to complete this. I need will need to rent a 3 trucks with trailers of 52 feet each this will way it will only take us 1 trip to get everything down to Miami, the cost for each truck will be 1500 per truck to get everything. I will need to hire about 5 to 8 people to remove everything from our office and take it to the trucks to be shipped. Unit 1 Phased Project Approach and High Level Project Plan Outline • How soon would I know if this process will be approved? • Would I be able to pay overtime to my contract employees • What would be the amount limit that I can use for the transportation? • How many employees can I get to move to Miami? • What would be the maximum I can spend monthly on rent for my new location? Unit 1 Phased Project Approach and High Level Project Plan Outline • How soon would...

Words: 5009 - Pages: 21

Premium Essay

Linux Security

...Applications Project Project Part 1 Task 1: Outline Security Policy This security policy is essential to the First World Bank Savings and Loan. It is used to break up the security plan not measurable, specific, and testable goals and objectives. This security policy would be used to provide all current and prospective customers online banking services while keeping the First World Saing bank competitive in the financial marketplace. This solution is also an imperative due to an estimated revenue of $100,0000,000 flowing in by virtue of online credit card transactions specific to banking and loan application based services. This security policy will go on to outline the specific regulations and legislation that are in agreement with the statutory compliance criteria. Below is a recommended view of the characteristics and components of the recommended security based policy. Taking up the stake of the performance, cost, and security of maintaining the Linux, and open source infrastructure will be within the premise of the defined roles and responsibilities. Annual cost savings are estimated to amount to $4,000,000 (approx) by virtue of implementation of this solution. The ‘C’-‘I’-‘A’ triad will be a crucial requirement fo the First World Savings Bank and translates to Confidentiality, Integrity and Availability respectively. Confidentiality aspect with reference to First World Savings Bank – Confidentiality refers to the principle that states that no part of the bank...

Words: 3404 - Pages: 14

Premium Essay

Administrative Controls

...ordinary prudence and reason (a reasonable man) would exercise under given circumstances. With this understanding we can see that Administrative Controls establish the ground work for an employee to understand and be able to do their job in accordance to the company’s policies and procedures. Administrative controls consist of approved written policies, procedures, standards and guidelines. Administrative controls form the basis for the selection and implementation of logical and physical controls. Logical and physical controls are manifestations of administrative controls. Some industry sectors have policies, procedures, standards and guidelines that must be followed – the Payment Card Industry (PCI) Data Security Standard required by Visa and Master Card is such an example. Other examples of administrative controls include the corporate security policy of Gramm-Leach-Bailey (GLB), which pertains to financial records maintained by brokerages, banks, lending institutions, and credit unions. GLB addresses the need for CIA over the financial records of consumers, and it outlines specific obligations that must be taken by these institutions to protect the data associated with such records. Due care policies identify the level of care used to...

Words: 2056 - Pages: 9

Premium Essay

Test Paper

...The Necessity of Information Assurance 1 The Necessity of Information Assurance Adam Smith Student ID: Western Governors University The Necessity of Information Assurance 2 Table of Contents Abstract ........................................................................................................................................... 5 Introduction ..................................................................................................................................... 6 Project Scope .............................................................................................................................. 6 Defense of the Solution ............................................................................................................... 6 Methodology Justification .......................................................................................................... 6 Explanation of the Organization of the Capstone Report ........................................................... 7 Security Defined ............................................................................................................................. 8 Systems and Process Audit ............................................................................................................. 9 Company Background ................................................................................................................ 9 Audit Details ...........................

Words: 12729 - Pages: 51

Premium Essay

Modifying Administrative System

...Contents Before you begin vii Topic 1: Plan for the new or modified administrative system 1 1A Identify the requirements of the administrative system 2 1B Obtain quotations from the suppliers/developers of systems 10 1C Select a system supplier or developer 14 Summary17 Learning checkpoint 1: Plan for the new or modified administrative system 18 Topic 2: Implement the new or modified administrative system 23 2A Identify and develop implementation strategies 24 2B Encourage staff to participate in the implementation process 29 2C Implement the system 32 2D Define and communicate procedures for using the system 35 2E Provide training and support on the use of the system 38 2F Deal with contingencies to ensure minimal impact on users 42 Summary46 Learning checkpoint 2 : Implement the new or modified administrative system 47 Topic 3: Monitor the administrative system 51 3A Monitor the system’s use, security and output 52 3B Modify the system to meet changing needs 57 3C Identify further modifications and notify users 61 3D Monitor staff training needs  63 Summary65 Learning checkpoint 3: Monitor the administrative system 66 Final assessment 69 Assessment information and scope Are you ready for assessment? Final assessment overview Assessment plan Final assessment tasks Record of outcome 70 71 72 73 74 101 Unit release 1 (Aspire Version 1.1) © Aspire Training...

Words: 5743 - Pages: 23

Premium Essay

Jit2

...Management- Task 1- Hoke Enterprises, Inc. Tara Johnson A. 2. Risk Description Source Likelihood of Occurrence* Severity of Impact* Controllability* 1. Customer Changes to the brief and/or scope of work contract Low High medium 2. equipment Failure to order on time resources Low High High 3. Interruption to Supply Location to major suppliers must be identified in relation to season, geographic area, & natural disaster. organization high medium medium 4. design Movement of existing structure natural Low Medium medium 5. bid price May be higher than budget allowance. contract low High high 6. financing Failure to secure sufficient revenue to meet operating costs. Economical Low High medium 7. Skill shortage Meeting balance between skilled workforce & demand. social Very high high high 8. licensing To avoid conflicts with community & maintain good reputation in environmental, health, & safety. legislative high high high 3. Risk levels- These should be categorized by the probability of the occurrence and its uncertain impact. The requirements per scalability levels should be set at minimum requirements. The project team may choose to work at a higher scalability level than required or work at a lower level. However, the project team should consider other factors to determine what level of risk management effort is needed. These factors may include: (1) political sensitivity, (2) the type of the project, (3) location of the project and the community...

Words: 2111 - Pages: 9

Premium Essay

Fxt2 Task 1

...Slide: 1 Presenter's Notes: Presentation regarding the university’s Disaster Recovery Plan/Enterprise Continuity Plan including: basic structures; roles within the DRP/ECP plan; areas within a company if addressed improve resilience to catastrophic events, and an employee awareness campaign. Slide 2: Presenter's notes: Presenter's notes: The presentation will cover several areas dealing with the university’s ability to prepare for an emergency or catastrophic event. The areas covered include: 1. Personnel roles within a disaster recovery and emergency continuity plan 2. Areas within the university that when properly addressed provide resilience to operational disturbances 3. Outline of a DRP/ECP training program. 4. Areas of the emergency plans that will improve by input from outside vendors. 5. The creation and execution of the plan to make employees aware of their roles in the DRP/ECP plan while confirming their understanding A1. DRP/ECP Roles Slide 3: Presenter's Notes: The responsibility of the emergency management team is to coordinate a series of teams within the university. First the perimeter security team is responsible for maintaining the physical security of the university’s property during an emergency. Second the technical support team must define operational procedures to create preparedness for an emergency; procedures to execute during an emergency situation, and procedures for catastrophic events to allow the business to function...

Words: 2078 - Pages: 9

Free Essay

Usability and Security

...Running Head: USABLE SECURITY THE IMPLEMENTATION Usable Security the Implementation Name Institution Abstract This project was about usability security and its implementation. It involved the designing and development of a suitable human computer interface to provide a log on module for the Kuwait armed forces computer system. The development focused on relieving the user from the load of creating, remembering and maintaining their passwords for the login process. Based on the fact that the Kuwait information and communication technology literacy levels are still in their infancy stage, the conventional authentication system was proved unfriendly to the user. This system was developed with this in mind. This proposed system relies on the user logging in to the system after identifying five pictures they uploaded earlier from among a grid of twenty five pictures. By selecting the five correct pictures which they uploaded, the system was able to successfully authenticate the user. Using these pictures greatly reduced the mental load on a user who was required to remember strong passwords that ended up being compromised (Badre 2002). The use of pictures or graphical images for authentication or access control is a practice called biometrics that is gaining popularity in establishing system security today. Due to the need to deliver a solution in the shortest time possible the...

Words: 17373 - Pages: 70

Premium Essay

Ethics Review

...Ethic Responsibility Project completed individually by members of team B during week three of ETH/316. Each team member has provided a review of there findings. Stephen Stephen completed the ethics game simulation’s two scenarios. The first scenario had to do with sexual harassment and the second scenario had to do with falsified data for a potential product. Both scenarios seemed simple on the surface, but once further research was conducted the answers to each scenario became a little more difficult. The scenarios took Stephen through a process to achieve the desired result and explained why things needed to be don’t in a certain way. For example, a big decision is to analyze all the information a then make a decision what is the first thing to do. For the first scenario, the first thing to do figure out what the problem is which meant talking to the female worker and explaining that all attempts would be made to keep her information confidential, however dependent on the allegations that it may not be completely possible. The next step was to find out who the primary stakeholders were. This was a difficult task for the author that prompted a review of outline materials referencing ethical stakeholders. The ethical lens was used to determine what the author should do initially was the Rights and Responsibilities Lens (Ethics game, 2007). The rights and responsibilities lens allowed the author to look at what ‘duties’ were required in this scenario (Ethics game, 2007)....

Words: 2672 - Pages: 11