•What are some of the security considerations in this conversion?
•What are some of the ethical and legal ramifications of keeping files with a person's name attached?
•What might be a better way of extracting (and storing) this information to ensure maximum security and control?
•Are there major differences between the two techniques?
•Are all messages critical or would encryption/authentication be applied only to certain transmittals? If so, which ones?
•Will these processes slow down operations?
•What other safeguards should be considered? (Provide 3 suggestions)
Case 3
Bishop Enterprises
Bishop Enterprises, located in Seattle, Washington, is a medium-sized business specializing in building concrete structures (storage building, bridges, utility buildings, and various defense-related installations).
Peter Bishop, president of the company, states that security of its computer systems is critical due to the competitiveness of the commercial concrete industry and the need to protect defense-related information. BE's computer system, as is typical of many, grew on an ad hoc basis as the company grew. Security was not an issue in the early days when there were only a few key employees and the day-to-day, hands-on-management style assured constant vigilance. Mr. Bishop now feels that a solid security package should be added to ensure the ongoing protection of the computer operation.
Mr. Bishop has assigned the task of evaluating several security packages to the director of computer operations, James Clarke. The four objectives that Mr. Clarke has defined for the package selected are:
1Accountability
2.Auditability
3.Integrity
4.Usability
What factors should be included in an official policy statement sent out with the request for proposal to the vendors? Write a clear and concise statement so that the vendor is able to respond correctly.
Question B1
Policymakers need to take into account a number of considerations, among them the rationale for a policy, available resources, the policy direction, budgetary and legal requirements, and expected policy outcomes. With these considerations, discuss and illustrate the life cycle of information security policy.
Question B2
With example, discuss step by step ways to identify whether your business information or system may have been attacked.
[10 Marks]
Question B3
Consider the Question 2 above. Assuming that the attacks was successfully identified, discuss an effective way of mitigating and minimising damage from the attacks. Also suggest what one can do to prosecute the offender of the attacks.
MyAssignmenthelp.com strives to provide best quality assignment writing services to students in USA. With a pool of 3000+ assignment experts, we are capable of offering premium quality assignment writing help in 100+ subjects. Our talented and hardworking assignment writers are capable of understanding individual needs and provide custom University assignment help on students demands.
Just share requirement and get customized Solution.
Orders
Overall Rating
Experts
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat. If you are unable to calculate word count online, ask our customer executives.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
Thank you, thank you, thank you. i already get A for this subject because i'm using my assigment help. actually it really helping me so much. My lecture has been proud of me. Thank you to expert team from assigment help they are really friendly, they...
Australia
My instructor was quite impress. However, there were too many grammatical errors present especial spelling please remember that certain words are spelt differently in the USA.
Australia
the expert he do his best in this assignment and he delivered to me in the time and I get high marks. i appreciate the expert who work for me on this assignment
Australia
I appreciated his work I will recommend this site to all my friends. the expert he do his best in this assignment and he delivered to me in the time and I get high marks,
Australia