Question

In: Computer Science

Search for security policy templates on the Internet. A good place to start is the SANS...

Search for security policy templates on the Internet. A good place to start is the SANS Institute www.sans.org. Using one or more of the templates you find, develop a security policy for a business or organization. Provide a description of the business, real or fictional, for which you will be writing the policy. Since there are so many areas of security, focus your policy on three specific areas. Be comprehensive in your coverage of your chosen areas. Do not simply copy another policy, rather customize it to your own organization. Your submission should be no fewer than five pages in length.

Solutions

Expert Solution

Different sections that make this Security Template, and they are as follows:

1. File System : - This is Used to set permissions to access the directories and files on the local system.

2. Account Policies : - These Policies are related with user accounts.

3. Local Policies :- Mainly this Policies deal with who has local access or network access to the computer.

4. System Services : -These System Services include security settings of the system services, such as file, print services on the local computer.

My security template will be constructed as follows:

  • Account Policies
    • Enforce Password XXXXX
  • 12 passwords remembered (this means that the user cannot use a password XXXXX they have already used in the past 12 password XXXXX)
    • Maximum Password XXXXX
  • 90 days (users must change password XXXXX 90 days)
    • Minimum Password XXXXX
  • 8 characters (passwords must be at least 8 characters)
    • Passwords must meet complexity requirements
  • Enabled (passwords must meet minimum complexity requirements)
    • Account lockout duration
  • 30 minutes (If account is locked out due to password XXXXX will remain locked out for 30 minutes, or until manually reset by administrator)
    • Account lockout threshold
  • 5 (Maximum number of failed logon attempts before account is locked out)
    • Reset account lockout counter after
  • 3 minutes (After 3 minutes a bad password XXXXX XXXXX longer applied to the Account lockout threshold)
  • Local Policies
    • Microsoft network server: Amount of idle time required before suspending session
  • 20 minutes (Ends server session after 20 minutes idle time)
    • Prevent local guests group from accessing application log
  • Enabled (prevents students from accessing/altering application log)
    • Prevent local guests group from accessing security log
  • Enabled (prevents students from accessing/altering security log)
    • Prevent local guests group from accessing system log
  • Enabled (prevents students from accessing/altering system log)
  • System Services
    • GameConsoleService
  • Disabled (prevents built-in Games from being shown/accessed)
    • Portable Device Enumerator Service
  • Disabled (prevents MP3 players, cameras and other portable devices from functioning with system)
  • File System
    • Set to allow users Read and Execute access to most folders on the local hard drive only.

Related Solutions

Advertisers contract with internet service providers and search engines to place ads on websites. They pay...
Advertisers contract with internet service providers and search engines to place ads on websites. They pay a fee based on the number of potential customers who click on their ad. Unfortunately, click fraud—the practice of someone clicking on an ad solely for the purpose of driving up advertising revenue—has become a problem. Business week reports that 40 percent of advertisers claim they have been a victim of click fraud. Suppose a simple random sample of 360 advertisers will be taken...
Advertisers contract with Internet service providers and search engines to place ads on websites. They pay...
Advertisers contract with Internet service providers and search engines to place ads on websites. They pay a fee based on the number of potential customers who click on their ad. Unfortunately, click fraud—the practice of someone clicking on an ad solely for the purpose of driving up advertising revenue—has become a problem. According to BusinessWeek 43% of advertisers claim they have been a victim of click fraud. Suppose a simple random sample of 300 advertisers will be taken to learn...
Search the internet for articles related to dealing with project sponsors. Summarize two good articles in...
Search the internet for articles related to dealing with project sponsors. Summarize two good articles in a memo that you could send to a new project manager, offering advice on how to effectively engage sponsors.
WEEK 1: GOOD COMPONENTS OF A SECURITY POLICY What are good components of an organizational information...
WEEK 1: GOOD COMPONENTS OF A SECURITY POLICY What are good components of an organizational information security policy? What are some areas that you think should be addressed? What are some obstacles that keep organizations from having a well thought-out security policy? How can they be overcome?
Search the Internet for websites where consumers can place complaints about a product. Describe the product/service...
Search the Internet for websites where consumers can place complaints about a product. Describe the product/service and the complaints. Analyze the complaints for patterns. Do these patterns identify a problem for the company that might be addressed based on complaints? Discuss the patterns, identify the problem(s), and give 2-3 examples of how the company can remedy the problem(s).
Search the Internet for financial information about the company selected. Search the Internet for financial information...
Search the Internet for financial information about the company selected. Search the Internet for financial information about the company selected. on Pfizer Comapany Evaluate the following in a 525-word response: Characteristics of common and preferred stock. How stock markets work. The connection between the value of shares and dividends. Mention the ticker symbol of the company studied, the current price of the stock, and its financial history. Indicate if you would recommend investing in this stock and why. Explain.
Automatic Data Processing(ADP) is the company. 1) A good place to start with an internal firm...
Automatic Data Processing(ADP) is the company. 1) A good place to start with an internal firm analysis is to catalog the assets a firm has. List the firm's tangible assets. Then make a seperate list of its intangible assets 1a.Then use the VRIO framework to identify the competitive postion held by your firm. Which, if any of these resources are helpful in sustaining the firms competitive advantage?
Give an example of an Internet search or database search that utilizes both “and” and “or”...
Give an example of an Internet search or database search that utilizes both “and” and “or” operators. Also consider other operators as appropriate for the search. Explain how the search ensures that the desired information is located. Explain how it prevents extraneous information from being included in the results.
Use the internet to search an example of a misleading advertisement in the media (e.g., Internet,...
Use the internet to search an example of a misleading advertisement in the media (e.g., Internet, television, radio, newspapers, etc.). Next, identify the premises and conclusions in the advertisement. What makes it misleading? Note: All students are required to post a minimum of two (2) posts per online discussion thread. Students must have one (1) original post and a minimum of one (1) other post per discussion thread.
Cyber security Cryptography Homework Part 1: Find good encryption solutions Search the web for various commercial...
Cyber security Cryptography Homework Part 1: Find good encryption solutions Search the web for various commercial encryption algorithms. Find one that you feel may be “snake oil”. Write a report explaining the encryption algorithm and your opinion *in-text citations and references are required *written in at least 2~3 paragraphs
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT