Question

For this assignment, imagine you are responsible for creating a security and privacy plan for a...

For this assignment, imagine you are responsible for creating a security and privacy plan for a small doctors' office that has 4 doctors and 10 staff. The purpose of your plan is to describe standards that help ensure the privacy and integrity of the many different facets of a network.

Include the following in your security and privacy plan:

  • Include policies that protect the hardware and physical aspects of the network.
  • Identify hardware areas that need to be secured.
0 0
Add a comment Improve this question Transcribed image text
Answer #1

ANSWER:

An enterprise wide network security plan for an organization depends upon the long term goals, ideas and missions of the company. A plan which suits the entire organization and provides security must be implemented. The plan must include avoiding various issues like
· Excessive user rights

· Database security backdoors

· Excessive file and directory access

· Inappropriate passwords

· Unauthorised accesses

The most common vulnerabilities that a plan addresses are password hacks, data insecurity, data loss, network intruders, firewall misconfiguration, etc.

Add a comment
Know the answer?
Add Answer to:
For this assignment, imagine you are responsible for creating a security and privacy plan for a...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • ***I only need the High Level Project Plan (Time to Implement)****** You have recently been hired...

    ***I only need the High Level Project Plan (Time to Implement)****** You have recently been hired by a new Japanese accounting firm, headquarter in Tokyo, as the director ofInformation Systems and Telecommunications. Your assignment is to assist security posture of the firm anddevelop a security structure for this new company. Write your recommendations and reasons to the firm’s CEO. The firm has 600 employees in Tokyo, 50 in Houston, and is planning to open two branch offices in India andCalifornia....

  • Create a certification plan for a chief information security officer (CISO). Assignment Requirements A chief information...

    Create a certification plan for a chief information security officer (CISO). Assignment Requirements A chief information security officer, or CISO, is responsible for information security for an entire business or organization. This person must have a deep understanding of both the business aspects of an organization as well as information security. CISOs possess a vision of the enterprise and the ability to develop sound strategies, to ensure that information assets and technologies are protected. Although a CISO typically has a...

  • You are responsible for creating a customer service training program. What design features would you include...

    You are responsible for creating a customer service training program. What design features would you include to ensure that transfer of training occurred and how would you vary the program to meet the needs of baby boomers versus millenials? Explain your answer. Also, please discuss why it is important to use a curriculum road map and application assignment in designing this training program. 0

  • Imagine that you are an administrator for a large hospital. Recently, your hospital has had shortages...

    Imagine that you are an administrator for a large hospital. Recently, your hospital has had shortages of staff in several areas. You have been asked to develop a job description and create an effective online job posting advertisement for a position of your choice. The most needed positions are RNs, LPNs, and direct patient care staff. Other needed positions are in the areas of operations, security, information technology, and nutritional services. You have been given the task of developing a...

  • OPTION #1: Assist in creating a Proposal: ......... XYZ Corporation XYZ Corporation is a small organization of roughly 2...

    OPTION #1: Assist in creating a Proposal: ......... XYZ Corporation XYZ Corporation is a small organization of roughly 20 to 30 employees working in a simple office space using basic peer-to-peer type networking in which all employees keep their data on their own PCs and each has his or her own devices (i.e., printers, scanners, and other peripherals). In the last few months, XYZ developed a revolutionary widget that will change technology as we know it. The company received a...

  • In this assignment, you will be creating a Work Breakout Structure (WBS) for your project using the software applicatio...

    In this assignment, you will be creating a Work Breakout Structure (WBS) for your project using the software application that you have selected. Prepare the WBS, and submit the file to your instructor. This assignment is due Sunday at 11:59 p.m. All assignments should be uploaded in the Assignment area. Project Software Options There are many project management software applications that are designed to help develop project plans and schedules as well as keeping track of these plans and creating...

  • In Option #1, you have been hired as an IT expert by a small firm to...

    In Option #1, you have been hired as an IT expert by a small firm to set up an office for 20 staff members, half of whom will work with desktop computers and the remaining with laptop computers using wireless networks. The office will use one networked laser printer, accessible from both the desktop and laptop computers. The desktop computers will use a wired network, while the laptop computers will employ wireless network to print and access the Internet. In...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • Which role has the PRIMARY responsibility for the documentation of control implementation? Systems security engineer Control...

    Which role has the PRIMARY responsibility for the documentation of control implementation? Systems security engineer Control assessor Information System Owner (ISO) Information Owner/Steward When making determinations regarding the adequacy of common controls for their respective systems, Information System Owner (ISO) refer to the Common Control Providers’ (CCP) Privacy Impact Assessment (PIA) Business Impact Analysis (BIA) Authorization Packages Vulnerability Scans An organization-wide approach to identifying common controls early in the Risk Management Framework (RMF) process does which of the following? Considers...

  • . . . Assignment 5—Key Service Elements This assignment tests your ability to plan a service...

    . . . Assignment 5—Key Service Elements This assignment tests your ability to plan a service delivery team. In it you will focus on three key service elements to ensure that service employees have the supports they need to prevent role conflict and sabotage. The three elements include: identifying the cycle (failure, mediocrity, or success) most common to ths industry. explaining how each company motivates and energizes talent, based on staff engagement. describing what training can offer employees. The two...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT