Question

Information technology (IT) infrascruture security policies are represented in many types of policy documents, depending on...

Information technology (IT) infrascruture security policies are represented in many types of policy documents, depending on the organization’s network and infrastructure needs. These differences stem from different cyber security risks. They also present organizations with different choices to define and make in their security policies.

1. What are some best practices organizations can observe when creating and maintaining domain policies?

2. LAN security policies often center on issues concerning connectivity; this includes determining how devices adhere to the network. What LAN security policies/standards does YOUR organization deploy? Why?

3. In general, WAN-specific standards identify specific security requirements for WAN devices. What WAN security policies/standards does YOUR organization deploy? Why?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

1) Following are some good practices observed by orgs:

a.Security incident response plan— A security incident strategy should give a guidelinethreat response, priorities identification along with fixes
b.Identity and access management (IAM) regulations—let IT administrators authorize systems and applications to the right individuals.
c.Personal and mobile devices— Drafting a policy for security of owned devices by employees can avoid exposure to future issues via employee-owned assets.
d.Privacy regulations— Organizations should protect the privacy of their data and their users.
e.Information and data classification—Poor information and data classification leave systems vulnerable.
f.IT operations and administration— Lack of cooperation between departments may lead to configuration errors.

2)

IT is responsible for establishing and maintaining standards for 802.11x wireless access points .

This needs high security as this acts as intranet and companies data will be compromised in event of this protocol being hacked into.

Add a comment
Know the answer?
Add Answer to:
Information technology (IT) infrascruture security policies are represented in many types of policy documents, depending on...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Please choose 5 questions from 20 and answer them. 1. How can a security framework assist...

    Please choose 5 questions from 20 and answer them. 1. How can a security framework assist in the design and implementation of a security infrastructure? What is information security governance? Who in the organization should plan for it? 2. Where can a security administrator find information on established security frameworks? 3. What is the ISO 27000 series of standards? Which individual standards make up the series? 4. What are the issues associated with adopting a formal framework or model? 5....

  • The purpose of security policies is to help mitigate identified risks. Writing these policies is easier...

    The purpose of security policies is to help mitigate identified risks. Writing these policies is easier once you have created an asset inventory list, prioritized that list, and identified the major risk exposures found in those assets. The task of identifying your IT assets begins with recognizing that your IT infrastructure and supporting resources can be divided into the seven IT domains. The benefit of identifying the assets and prioritizing them across those domains is being able to document policies...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • Hello, Need my paper proof read, I have problems with my paper structure. I need help...

    Hello, Need my paper proof read, I have problems with my paper structure. I need help with my flow as I feel as if my analysis is not iter mixing with the my paper. For example currently I have citation, citation, example, then my analysis. I need help restructure my paper for better flow. I have copied and pasted my paper for review below: Smart home devices have been a growing trend in the Canadian market with approximately 18% of...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable...

    Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable detail how a company leverages an ERP system and how its operations are improved after installing an ERP system like SAP. Explain how a supply chain management system helps an organization make its operations more efficient What is Upstream and Downstream management of the supply chain? Explain the concept of “Supply Network”, its benefits, and how technology made this concept available Explain the difference...

  • Area Act Date Description Telecommunications Telecommunications Deregulation and Competition Act of 1996—an update to Communications Act...

    Area Act Date Description Telecommunications Telecommunications Deregulation and Competition Act of 1996—an update to Communications Act of 1934 (47 USC 151 et seq.) 1934 Regulates interstate and foreign telecommunications (amended in 1996 and 2001) Civil legal evidence Federal Rules for Civil Procedure (FRCP) 1938 As updated in 2006, specifies requirements for the storage, protection, and surrender of discoverable electronic data as used in federal civil proceedings Freedom of information Freedom of Information Act (FOIA) 1966 Allows for disclosure of previously...

  • Introduction: A manufacturing company that possesses many complexities can be highly challenged when maintaining production goals...

    Introduction: A manufacturing company that possesses many complexities can be highly challenged when maintaining production goals and standards in conjunction with a major organizational change. Garment manufacturing is a complex industry for many reasons. The product line is a complex array of styles, seasons, varying life cycles and multidimensional sizing. Many sewn product firms are viewing TQM as the appropriate strategy to meet the double demand of competition and quality; however, many companies are finding sustaining their TQM adoption decision...

  • TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been...

    TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been employed by Regional Gardens as their first Chief Information Officer (CIO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources. You are concerned that the company has no existing contingency plans in case of a disaster. The Board indicated that some of their basic requirements for...

  • BACKGROUND Throughout the United Arab Emirates (UAE), Du Telecom provides mobile and fixed telephony, broadband connectivity...

    BACKGROUND Throughout the United Arab Emirates (UAE), Du Telecom provides mobile and fixed telephony, broadband connectivity and IPTV (Internet Protocol Television) services to people, homes, and businesses. When it opened for business in 2006, the company boldly entered what was already a saturated market with 100% penetration. Although du Telecom recognized that the telecom industry in the Arabian Gulf is fast growing and that the company would face ever increasing competition, it approached the market as an opportunity rather than...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT