Question

Instructions: For the scenarios that follow, identify the data that would need to be protected. Recommend how you would imple
Access Controls • Administrative controls: Policies approved by management and passed down to staff, such as policies on pass
0 0
Add a comment Improve this question Transcribed image text
Answer #1

Here i am providing the answer. Hope it helps. please give me a like. it helps me a lot.

Ans) As we can see in our scenario we have to protect data which we receive from NetSecIT i.e. a MNC
So we can have access control on logical/technical controls i.e. control access to a computer system or network such as username and password combination.
Because according to scenario we can see that every employee have internet access and use email for communication and all and also some of the employees are working from remote places
So for take every one's expect in mind we have to control over our technical/logical control
Because we can see or analyse that who is working with what and when from our system in our office.
So It is suitable for both remote and organisation employees to take care of it.

Thank you. please upvote.

Add a comment
Know the answer?
Add Answer to:
Instructions: For the scenarios that follow, identify the data that would need to be protected. Recommend...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • common encrytion algorithms and methods: DES RSA Triple DES Diffie-Hellman key exchange IDEA EL Gamel encrytion al...

    common encrytion algorithms and methods: DES RSA Triple DES Diffie-Hellman key exchange IDEA EL Gamel encrytion algorithm CAST ECC Blowfish SSL AES Digital signature Confidential services inc. is a milatary support branch consisiting of 14,000,000 computers with internet access and 250,000 servers. All employees must have security clearances. they communicate mainly through internally secured systems. confindential services inc. is concered that sensitive information may inadvertenly be exposed and wants to implement a symmetric file encryption algorithm that is strong but...

  • common encrytion algorithms and methods: DES RSA Triple DES Diffie-Hellman key exchange IDEA EL Gamel encrytion al...

    common encrytion algorithms and methods: DES RSA Triple DES Diffie-Hellman key exchange IDEA EL Gamel encrytion algorithm CAST ECC Blowfish SSL AES Digital signature Scenario: NetSeclt is a multinational IT services company consisiting of 100,000 computers that have internet access and 40,000 servers. ALl employees communicate using smartphones and email. Many employees work from home and travel extensively. Netselt would like to implement an asymmetric general-purpose encryption technology that is very diffcult to break and has a compact design so...

  • TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been...

    TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been employed by Regional Gardens as their first Chief Information Officer (CIO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources. You are concerned that the company has no existing contingency plans in case of a disaster. The Board indicated that some of their basic requirements for...

  • Networking fundamentals ICLOUU10P 1. A(n) is a set of peer computers that share resources such as...

    Networking fundamentals ICLOUU10P 1. A(n) is a set of peer computers that share resources such as files and hardware. 2. A(n). is a logical grouping of users and equipment as defined by the network administrator. 3. Microsoft server editions have interfaces similar to the current was new for Windows Server 2008 and Windows 7 and is designed to improve network performance by storing information downloaded from the Internet or a web server onto a local area network client. 5. An...

  • ***I only need the High Level Project Plan (Time to Implement)****** You have recently been hired...

    ***I only need the High Level Project Plan (Time to Implement)****** You have recently been hired by a new Japanese accounting firm, headquarter in Tokyo, as the director ofInformation Systems and Telecommunications. Your assignment is to assist security posture of the firm anddevelop a security structure for this new company. Write your recommendations and reasons to the firm’s CEO. The firm has 600 employees in Tokyo, 50 in Houston, and is planning to open two branch offices in India andCalifornia....

  • Quiz 5 Chapter 21 Multiple Choice Identify the choice that best completes the statement or newer...

    Quiz 5 Chapter 21 Multiple Choice Identify the choice that best completes the statement or newer the question 1. In this chapter, media is defined as a type of communication. b. a type of ink. c. data storage devices. d. A and C 2. What statement is not correct? a. A personal computer is a single user electronic data processing device. b. A personal computer and peripheral devices are hardware. c. Output devices allow data to be entered into the...

  • IT's About Business 4.1 The Heartbleed Bug What Is Heartbleed? OpenSSL, an open-source software package, is...

    IT's About Business 4.1 The Heartbleed Bug What Is Heartbleed? OpenSSL, an open-source software package, is a popular type of transport layer security (TLS) software (discussed later in this chapter) that secures numerous websites around the world. Web servers use OpenSSL to encrypt sites. Such sites show up in browsers with a “lock” icon and the “https” prefix in the address bar. The encryption protects Internet sites offering banking, shopping, email, and other private communications. Roughly two out of three...

  • Outsourcing Vendor, SaaS Client Optimizing the allocation of resources for IT services sometimes creates unexpected situations....

    Outsourcing Vendor, SaaS Client Optimizing the allocation of resources for IT services sometimes creates unexpected situations. This is a story of a leading vendor of IT outsourcing that decided to outsource one of its own IT functions. More accurately, it relies on software as a service. Siemens AG is a German-based global corporation and one of the world's largest firms. It specializes in electronics and engineering. It employs 475,000 people in 190 countries, and reported revenue of $107.4 billion in...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • Area Act Date Description Telecommunications Telecommunications Deregulation and Competition Act of 1996—an update to Communications Act...

    Area Act Date Description Telecommunications Telecommunications Deregulation and Competition Act of 1996—an update to Communications Act of 1934 (47 USC 151 et seq.) 1934 Regulates interstate and foreign telecommunications (amended in 1996 and 2001) Civil legal evidence Federal Rules for Civil Procedure (FRCP) 1938 As updated in 2006, specifies requirements for the storage, protection, and surrender of discoverable electronic data as used in federal civil proceedings Freedom of information Freedom of Information Act (FOIA) 1966 Allows for disclosure of previously...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT