Question

In: Computer Science

A small research company in Sydney is working to develop a new method of mass storage...

A small research company in Sydney is working to develop a new method of mass storage to replace current storage technology. Four engineers and an office manager working there. The engineers are highly skilled professionals, and the office manager is a capable computer user. The company has a high-bandwidth internet connection because employees must conduct research frequently. The employees have hopes of making a breakthrough and bringing the company public within the next two years. You have been hired as a security consultant to assess the company’s needs. Write a paper recommending what type of security policy should be used (open, moderately restrictive, or highly restrictive) and what security technologies should be used. On what areas should the security policy focus (Physical security, data security, auditing, passwords, and so forth), and what technologies should be used to secure these areas?

Please its very urgent i need it in few minutes

Solutions

Expert Solution

First of all let us understand that why do we need a security policy and what is it?

It is basically a protocol which is set by the organization in order to maintain the security of data in the organization. All the users within this organization need to follow these guidlines.

We need a security policy inside an organization because we have to prevent the misuse of data, applications and networks within an organization.

What type of security policy should be used?

1. Firewall Policy: Since there is high bandwidth internet connection, we definitely need a firewall policy so as to block unauthorized access to the network devices within the organization. If there is any cyber attack then that will also be detected using this.

2. Virus Protection Policy: Due to high internet usage, virus may attack. It will help in detecting any threats to the data files and some of them will also be removed. So, we need a virus protection policy.

3. Intrusion Prevention Policy: Attacks like browser attacks and network attacks will be detected by this and this will help in getting rid of them.

4. Application and Device Control: Since there are numerous users involved in an organization, we do need a policy which will help in managing the installation of various applications and devices connected to a particular system.

We need these policies in order to maintain integrity, availability and accessibility.

There are different policies like open, moderate, ristricted and highly ristricted. We need highly ristricted when the data we are using is highly confidential and moderate security policies are used when the data is more available for the users and it is not highly confidential, So it all depends upon the data and information that our organization has.

Types of Security Technologies:

There are a number of security technologies which can be used to in order to maintain the security of data in our organization.

1. Intrusion Detection System: This system is used to detect any malicious traffic that is trying to enter into the website. It will take necessary action by raising alert. As the entry of any malicious traffic is restricted into the network of organiztaion, no harm will be caused.

Like this we have intrusion prevention system, which will prevent any malicious attack from happening by taking necessary action against it.

2. Firewall: Whenever there is involvement of internet, we need network firewalls in order to protect the internet and our website from any unsual traffic. We cannot allow any untrusted data on our sytem. There are different types of firewalls and its implementation will depend upon our usage.

3. Antivirus: It is the most common technology that is used in cybersecurity. In order to protect our systems from the virus, we need an antivirus software installed on our systems.

A security policy should focus on the following areas:

1. Physical Security: It is needed so as to the protect our hardware devices as well as the softwares. Physical security is basically related to preventing our resources from any physical damage.

2. Data Security: Since we have a research organization, the sole focus should be on the data security as the data is highly confidential. We need to prevent our data and information from any malicious usage.

3. Password: Password protection should always be there so that no other unauthorised user can assess our information easily. We need to protect all this.


Related Solutions

A small research company in Sydney is working to develop a new method of mass storage...
A small research company in Sydney is working to develop a new method of mass storage to replace current storage technology. Four engineers and an office manager working there. The engineers are highly skilled professionals, and the office manager is a capable computer user. The company has a high-bandwidth internet connection because employees must conduct research frequently. The employees have hopes of making a breakthrough and bringing the company public within the next two years. You have been hired as...
You are working for a large pharmaceutical company that is trying to develop new therapies to...
You are working for a large pharmaceutical company that is trying to develop new therapies to stop an aggressive form of breast cancer. Your goal is to develop several different therapies that seek to influence the abnormal control of cell cycle and apoptosis in these cancerous cells. You’ve worked out a mechanism to deliver your small molecules directly to the tumor, so that it is only taken up by specific cells (cancerous cells), however you are still working on your...
A researcher working for a drug company is interested in investigating the effect of storage  on the...
A researcher working for a drug company is interested in investigating the effect of storage  on the potency of one of the company’s drugs. 10 freshly produced bottles of the drug were  randomly selected and the potency measured. Another 10 freshly produced bottles of the  drug were randomly chosen and stored under controlled conditions for six months before  the potency was measured. Summary statistics are displayed below: Storage  n  Mean Std. Deviation  Fresh 10 10.37 0.3234 Stored 10 9.83 0.2406 (a) Carry out a t‐test to investigate...
Your company has spent $250,000 on research to develop a new computer game. The firm is...
Your company has spent $250,000 on research to develop a new computer game. The firm is planning to spend $1,400,000 on a machine to produce the new game. Shipping and installation costs for the new machine total $200,000 and these costs will be capitalized and depreciated together with the cost of the machine. The machine will be used for 3 years, has a $200,000 estimated resale value at the end of three years, and will be depreciated straight line over...
Your company has spent $180,000 on research to develop a new computer game. The firm is...
Your company has spent $180,000 on research to develop a new computer game. The firm is planning to spend $40,000 on a machine to produce the new game. Shipping and installation costs of $5,000 for the machine will be capitalized and depreciated. The machine has an expected life of five years, a $25,000 estimated resale value, and falls under the MACRS five-year class life. Revenue from the new game is expected to be $200,000 per year, with costs of $100,000...
Grounded theory is a research method that seeks to develop theory that is grounded in data...
Grounded theory is a research method that seeks to develop theory that is grounded in data systematically gathered and analyzed. According to Martin and Turner (1986), grounded theory is "an inductive, theory discovery methodology that allows the researcher to develop a theoretical account of the general features of a topic while simultaneously grounding the account in empirical observations or data." Discuss the techniques of grounded theory.
Company is a small, but diversified, moving and storage company. In recent years, its corporate income...
Company is a small, but diversified, moving and storage company. In recent years, its corporate income has declined to unacceptable levels. To change the direction of the company, the board of directors hired a new chief executive officer. She is currently considering three alternative ways as to how division managers are rewarded for their performance. They are: Give each manager a competitive salary with no bonus for performance. Give each manager a base salary with the largest portion being a...
Imagine that you are working for a company that asks you to develop a political and...
Imagine that you are working for a company that asks you to develop a political and economic risk checklist for any direct investment decision your company might undertake in a foreign country – your company wants to make sure it has considered all significant external risks (as opposed to strategic, competitive, financial, or market risks) that might affect the company's ability to generate positive returns on its investment. One example of a risk that needs to be considered is the...
Is Boeing working internationally to access new markets? To gain low-cost input factors? To develop new...
Is Boeing working internationally to access new markets? To gain low-cost input factors? To develop new competencies? Is its approach in all three areas appropriate?
ANALYSIS An Australian manufacturing company is keen to develop new products and develop new product line...
ANALYSIS An Australian manufacturing company is keen to develop new products and develop new product line of shoes so that the company can expand into Asian markets more than before. The data have been collected for 99 products from the market. The data are in an excel file named “SHOES”. The file includes: PRICE: Price of the shoes in dollars. GENDER: 1 for Female product and 2 for Male product. COUNTRY: the country in which the shoes is produced: 1...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT