Networking Security Fundamentals Week 1 Question 1 "Providing Security Over Data" Please respond to the following: The CIA Triad offers three security tenets that allow data owners the framework to secure data. Considering your place of employment or your home computing environment, discuss in detail the means in which each of the three tenets are addressed to mitigate risk and enhance security in your chosen environment. In my workplace, all three security tenets are strongly enforced. Our
Words: 1411 - Pages: 6
recovery, platforms, security and consultants (Small Business - Chron.com, 2013). Information technology has become the essential part of the telecommunications industry. Today every organization is facing the task of balancing the need of have a sophisticated Technology with the need to keep the cost of IT reasonable (atkearney.com, 2010). Telstra at its current growth phase faces host of different challenges in all sectors of its business. Network Management The Telstra has recently look
Words: 2770 - Pages: 12
------------------------------------------------- Week 1 Laboratory How to Identify Threats & Vulnerabilities in an IT Infrastructure Learning Objectives and Outcomes Upon completing this lab, students will be able to: * Identify common risks, threats, and vulnerabilities found throughout the seven domains of a typical IT infrastructure. * Align risks, threats, and vulnerabilities to one of the seven domains of a typical IT infrastructure * Given a scenario, prioritize
Words: 546 - Pages: 3
Computer Security & Privacy - TJX Case Backgroud: TJX, largest apparel and home fashions retailers in the off-price segment was struck with Security Breach in all of its eight business units in US, Canada and Europe. Intruder had illegally accessed TJX payment system to hack personal and credit/debit card information of an unspecified number of customers. Security breach had affected Customers - pay for the purchases made by the intruders/ card invalidated / expiring the spending power, Financial
Words: 620 - Pages: 3
that in the report, I give a brief scenario explanation and how what kind of potential impact it will have on the organization. Any threat is alarming because it could damage the assets of the company if this is true we first need to have a Business Continuity Plan (BCP) which allows the company to keep operating in case of an attack. My order of planning would be to discover the disaster recovery
Words: 401 - Pages: 2
User Domain: The first layer of security in a multi-layer security plan. It’s also the weakest in the IT Infrastructure. Certain protocols and procedures need to be followed. • Implement and Conduct Security Awareness Training. • Implement Acceptable Use Policy (AUP). • Monitor employee behaviors. • Restrict access to users to certain programs and areas. Workstation Domain: The second layer of security in a MLS plan. This is where most users connect via Workstation computers, PDA’s, Laptops
Words: 574 - Pages: 3
A risk is the likelihood that something bad will happen to an asset. • A threat is any action that could damage an asset. • A vulnerability is a weakness that allows a threat to be realized or to have an effect on an asset. • Gramm-Leach-Bliley Act (GBLA) – Passed in 1999, the GBLA requires all types of financial institutions to protect customers’ private financial information. • Protecting private data is the process of ensuring data confidentiality. Organizations must
Words: 1641 - Pages: 7
A Case Study Report On Cisco Systems Risk Strategies Submitted to, Amy vuong Submitted by, Marut shah Vishal Dave Manthan Shekhadia Keyur Patel Rudraksh Gaikwad Imran Siddique Mohammad Faisal Contents 1. Introduction ............................................................. 4 1. Executive summary .............................................. 4 2. Issue identification .................................................. 5 1. Challenge & Issues ........................................
Words: 1861 - Pages: 8
Recovery Plan: A Brief Overview IT244 Axia Online College of University of Phoenix This following paper will highlight a brief overview of a DRP, covering the purpose of a DRP, key elements of a DRP, methods to test a DRP, and why testing should be done on a DRP. The main function or purpose of a DRP is to basically help identify a logical plan to recover from a disaster. Such as in any business, especially dealing with information technology, a DRP can help a business or company
Words: 583 - Pages: 3
Emergency Preparedness & Business Continuity I. Introduction: The Plan About this Document 1 What a Disaster Plan Is and Why You Should Do One 2 Possible Disasters 4 Assign a Team—You Can’t Create a Plan Alone 6 II. Analyze & Know Your Organization Determine Your Critical Services & Functions 8 Where is Your Information Stored? 10 Computers & Technology 15 Know Your Physical Plant 18 III. Risk Analysis 19 IV. Business Impact Analysis 20
Words: 8506 - Pages: 35