Question

Consider the overall team project solution (hardware and software) relative to security. Create and submit a...

Consider the overall team project solution (hardware and software) relative to security. Create and submit a 3–4-page Word document defining your recommendations concerning security. Be sure to articulate reasons for specific choices. Include in your document an explanation about the relationship between the IT security policy and the chosen security mechanisms for your overall solution. Be prepared to discuss your thoughts with the team’s Security Specialist.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

IT Security inside of any project is need of the hour.Almost every area of project now-a-days require security.Starting from Requirement analysis to estimation and from software development to management and to delivery,every phase has its own constraints when security is concerned.

Every organisation decides and then abides by certain framework that meets its need of IT security and this framework is codified as Security policy.A security policy is a document,generally prepared by some senior management or by people who are experts in the domain,stating the information values,protection responsibilities and organizational commitment.These policies are the followed by taking specific actions ruled mainly by management control principles and thereby utilizing specific security standards, procedures, and mechanisms.

The need of Information security depends on 3 major requirements:

Confidentiality,

Integrity and

Availability

All these depends strongly on circumstances.

Confidentiality

It is a requirement whose purpose is to keep sensitive information for getting accessed by any unauthorized user.The policy requires systems to be robust when t comes to facing wide variety of attacks.The policies that ensure confidentiality do not explicitly itemize the range of threats that are expected,Instead they propose for operational approach which expresses the policy statement which describes the particular management controls which shall help in achieving confidentiality.Thus they avoid listing threats, which would represent a severe risk in itself, and avoid the risk of poor security design exclusive in taking a fresh approach to each new problem.

Integrity

Integrity is a requirement that helps in ensuring that the information and programs are changeable only by some specified and authorized recipients.It is important for maintaining the consistency in data and allow data to be changed only in an approved manner.The degree of accuracy is measured by this constraint.

Availability

Availability is a requirement that ensures systems to work promptly and service is not denied to authorized users.

From an operational point of view, this requirement refers to adequate response time and a guaranteed bandwidth. From a security point of view, it represents the ability to protect against and recover from a damaging event. The availability of properly functioning computer systems is essential to smoothly carry on the operations of many large enterprises and sometimes preserves lives. Contingency planning is concerned with assessing risks and developing plans for averting or recovering from adverse events that might render a system unavailable.

Add a comment
Know the answer?
Add Answer to:
Consider the overall team project solution (hardware and software) relative to security. Create and submit a...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • a- Using clear rationale and evidence from the case, discuss the reasons behind the lack of...

    a- Using clear rationale and evidence from the case, discuss the reasons behind the lack of motivation to sell the new program. Also, offer the manager recommendations on how to solve the identified problem(s) using each of the following theories. Please discuss the issues and solution using each theory separately: (24%) i- Expectancy theory ii- Equity theory iii- Goal-setting theory b- Using operant conditioning theory, discuss what are the main problems in the manner by which the organization is trying...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • Select two of the discussion questions and analyze the case study using project management principles. Apply...

    Select two of the discussion questions and analyze the case study using project management principles. Apply your knowledge of project management to the facts presented in the case study to describe how you would proceed. We only need to answer one of the questions. A thorough answer will probably require 300 to 500 words for each question.   Feel free to use text bullets, tables, or graphics to summarize your points. Questions Q1: Make or Buy decision – Describe the make...

  • How can we assess whether a project is a success or a failure? This case presents...

    How can we assess whether a project is a success or a failure? This case presents two phases of a large business transformation project involving the implementation of an ERP system with the aim of creating an integrated company. The case illustrates some of the challenges associated with integration. It also presents the obstacles facing companies that undertake projects involving large information technology projects. Bombardier and Its Environment Joseph-Armand Bombardier was 15 years old when he built his first snowmobile...

  • I need help with my very last assignment of this term PLEASE!!, and here are the instructions: After reading Chapter T...

    I need help with my very last assignment of this term PLEASE!!, and here are the instructions: After reading Chapter Two, “Keys to Successful IT Governance,” from Roger Kroft and Guy Scalzi’s book entitled, IT Governance in Hospitals and Health Systems, please refer to the following assignment instructions below. This chapter consists of interviews with executives identifying mistakes that are made when governing healthcare information technology (IT). The chapter is broken down into subheadings listing areas of importance to understand...

  • First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below...

    First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below Include each of the following in your answer (if applicable – explain in a paragraph) Research problem: what do you want to solve using Delphi? Sample: who will participate and why? (answer in 5 -10 sentences) Round one questionnaire: include 5 hypothetical questions you would like to ask Discuss: what are possible outcomes of the findings from your study? Hint: this is the conclusion....

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT