Question

In: Computer Science

Cyber security Security Policy: , write a small antivirus policy for the IT infrastructure and users...

Cyber security

Security Policy:

  1. , write a small antivirus policy for the IT infrastructure and users in a
    1. small business
    2. an elementary school
    3. You may research anti-virus policies of organizations on the web, please use and cite responsibly.

Security Recommendation: Rose Shumba manages the IT security for a school. Given the wide range of people who use the school’s computers, it is challenging for Rose to prevent virus infections. She has installed an anti-virus on each machine and has a policy prohibiting software downloads.

Comment on:

  1. How secure is the network from viruses?
  2. What areas has Rose not secured?
  3. What recommendations would you make to Rose to increase the security?

Solutions

Expert Solution

A. How Secure is the network from Viruses?

the policy adopted by Rose Shumbha prohibits software downloads. this prevents any body from downloading the softwares online and hence the network is secure from all viruses which can enter the network while downloading softwares

B. Rose has not secured following areas

1. USB and other hardware points : Viruses can also enter the system through hardwares like Pen drives/CD drives etc. Rose has not secured such points.

2. Software Installations Permissions:. Software installations being done through offline installers also try to communicate online which may also lead to viruses.

3. Unsecured School Gateway: Installing antivirus on individual systems can protect that system. Possibilities are there thqat the viruses may enter through the gate way / proxy server also.

4. Unsecured Browser: Viruses can also enter through the browsers

C. What recommendations would you make to Rose to increase the security?

I would like to recommend following policies to be included

1. There should be hardware restrictions throughout the network infrastructure. For example the USB drives and CD drives must be disabled on the systems. any use of pen drives , CD drives and other plug ins must be allowed only after propper scanning . this facilities should be available at central level under expert supervision

2. Installation of softwares should be screened and allowed only after proper check and permission by competent expert authority.

3. The school gateway/ proxy server must be secured enough by using firewall etc so that no external entity gains access of the internal infrasturucture without undergoing proper check. all the incomming mails and outgoing mails must be screened and monitored.

4. A lot of viruses may enter through the browsers. There fore there should be proper filtering and restrictions on the websites at proxy server level. The various security features of the browsers may also be enabled to ensure the integrity and security of the infrastructure.


Related Solutions

Cyber security write a small antivirus policy for the IT infrastructure and users in a small...
Cyber security write a small antivirus policy for the IT infrastructure and users in a small business an elementary school You may research anti-virus policies of organizations on the web, please use and cite responsibly.
Prompt: You will submit your creation of a cyber-security policy. The cyber-security policy will assess how...
Prompt: You will submit your creation of a cyber-security policy. The cyber-security policy will assess how the organization will interpret security issues that occur in the workplace. The cyber-security policy will also distinguish and examine ethical issues in the workplace that pertain to social media, email, and privacy. Compose an organizational security policy that protects the confidentiality , integrity , and availability of EQUIFAX DATA BREACH IN 2017 Original Question : Prompt: You will submit your creation of a cyber-security...
Describe each of the 5 main types of cyber security: 1) Critical infrastructure security: 2) Application...
Describe each of the 5 main types of cyber security: 1) Critical infrastructure security: 2) Application security: 3) Network Security: 4) Cloud security: 5) Internet of things security
Based on information from the National Cyber Security Alliance, 93% of computer owners believe that they have antivirus programs installed on
Based on information from the National Cyber Security Alliance, 93% of computer owners believe that they have antivirus programs installed on their computers. In a random sample of 400 scanned computers, it is found that 380 of them (or 95%) actually have antivirus programs. Use the sample data from the scanned computers to test the claim that 93% of computers have antivirus programs.  
Compare and contrast cyber security policy of Victorian and NSW governments
Compare and contrast cyber security policy of Victorian and NSW governments
Saudi Aramco post cyber security attack. Make a plan that relates to statements of policy. Recommend...
Saudi Aramco post cyber security attack. Make a plan that relates to statements of policy. Recommend protocols and mitigating factors to the organization. Justify how the disaster response protocols will mitigate the threats to and vulnerabilities of the organization. Focus on disaster and incident response protocols as well as access control. Then assess the proposed method on maintaining the success of the plan going forward. Justify how your method will ensure the ongoing effectiveness of the information assurance plan.
Write a physical security policy for any organization.
Write a physical security policy for any organization.
Cyber security is an essential tool for managing risks in today’s increasingly dynamic and capable cyber...
Cyber security is an essential tool for managing risks in today’s increasingly dynamic and capable cyber threat landscape. Yet the market for cyber security remains small, and organizations are making only tactical investments in cyber security measures—one of the reasons why there has been an increase in cyber-attacks. Evidence suggests that this trend will last for some time to come. However, the anticipation of an increasingly open and mobile enterprise should help refocus the spotlight on strategic investments in areas...
(cyber security ) What is the difference between Cyber Espionage and Nation State Hacking? Explain the...
(cyber security ) What is the difference between Cyber Espionage and Nation State Hacking? Explain the differences with the help of appropriate examples. Please provide your own words. No copy from the internet. 150 to 200 words.
Discuss Cyber Security as it relates to the role of the US government. Discuss Cyber Security as it relates to the responsibilities of the individuals who are involved in creating the technology.
(a) – Discuss Cyber Security as it relates to the role of the US government. (b)– Discuss Cyber Security as it relates to the responsibilities of the individuals who are involved in creating the technology.  
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT