Posted: February 28th, 2023
In this activity, you will develop a laptop organizational security policy and evaluate whether it meets the needs of the organization in the face of incidents which occur after the policy has been implemented. assignment
Description: In this activity, you will develop a laptop organizational security policy and evaluate whether it meets the needs of the organization in the face of incidents which occur after the policy has been implemented.ObjectivesCompany policies define, at a high level, how an organization will fulfill its mission. Procedures specify how company policies will be implemented For example, a policy may state that users will be authenticated by a two-factor authentication method, whereas a related procedure may detail what specific smart cards will be used, how to configure the certificate server, what types of digital certificates will be used, and so on.Developing policy and procedure may not be as captivating as developing software or engineering network infrastructure, but it is just as important. Without clear, complete and appropriate policies and procedures, business would be haphazard, training of new employees would be inconsistent, and realistic goals for product and/or service quality would not likely be met. Moreover, regulatory and legal mandates would most likely be violated.After completing this lab, you will be able to:Develop a company laptop policyWrite my Essay Online Writing Service with Professional Essay Writers – Explain how policies contribute to the achievement of an organization’s missionEvaluate a policy’s effectiveness and applicability and modify the policy as neededMaterials RequiredThis lab requires the following:Computer with lnternet accessActivityIn this lab, you create a corporate policy for the management and use of laptops.1. Review the following background information about the hypothetical company for which you will design a laptop policy.The Acme Printing and Publishing Company has corporate offices in New York City and regional offices in Scranton, Buffalo, and Baltimore. The company designs and prints internal publications for large corporations and for various U.S. government agencies. Much of the work product is considered highly classified by the company’s clients, and the Acme Information Technology and Security departments implement strong access controls.There are 250 employees in the corporate office and 75 employees in each regional office.Top-level management has decided to issue company laptops to 100 users (executives, quality control, and sales employees).The company laptops will be used to connect (a) to the corporate network via wired or wireless connections when in corporate locations, (b) to the Internet through an Internet service provider with which Acme has contracted, and (c) to the corporate network via VPN from remote locations.All laptops will run Windows 7 Enterprise Edition, Microsoft office 2010, and several line-of-business applications. All network servers run Windows Server 2008.
2. You are tasked with developing a policy that governs the management and use of laptops. Consider both the company background described in Step 1 and what you have learned about information security during your security course. Take into account threats, risks, vulnerabilities, consequences (should a threat occur), and available security controls. Be sure to consider both technical (enforceable) and social (unenforceable) controls. Consider methods to assure compliance with your policy. Create an outline for the security section of the laptop policy. You should break the security section into specific areas, such as Physical Security, Access Control, and so on. For example, one of the entries under the Physical Security heading might be “All laptops will have a bar coded identification tag firmly affixed.”Create the outline for your laptop policy using sources such as your course textbook and the lnternet. Only when you have completed your policy outline should you go on to Step 3.3. Do not continue with this step until you have completed Step 2. Your laptop policy has been implemented and the company laptops have been issued. Your manager informs you that the following issue has been reported. A company sales employee, who was onsite at a client company’s location, connected his laptop to the client’s network to download documents and the proprietary software program required to view them. The employee was unable to install the program and got an error message stating that he did not have the rights required to install the program and referring him to the Acme systems administrator.Does your laptop policy address this issue? If not, revise your policy so that it does. If so, was the response the user received when trying to install the software consistent or inconsistent with your policy?4. Several weeks later your manager reported another incident. An employee used her company laptop to connect to a wireless hot spot at a coffee shop in an airport. The next day, she reported that her laptop was behaving oddly; programs were taking a long time to run, and when working on a Microsoft Word file, the document suddenly went blank and the file, which she was sure she had saved earlier, could not be found on her system. Later, from her home, she connected to the corporate network through her VPN connection. The next day, the log files of the remote access server and of the antivirus hardware/software showed that her laptop had been infected by a well-known virus and that an attempt had been made, during her VPN connection the previous day, to infect her office workstation with the same virus. The employee was clearly distraught, and there is no suspicion that this was a deliberate attack on her part.Does your laptop policy address these issues? If not, revise your policy so that it does. If so, was the user’s experience with the use of the wireless hot spot and the infection of the laptop by a well-known virus consistent with your policy? Does your policy address the attempt by the laptop to infect the employee’s office workstation via the remote access server? If not, revise your policy so that it does. If so, was the outcome consistent with your policy?5. Submit your laptop policy outline (including revisions based on steps 3 and 4) to your instructor.
.doc file
Order | Check Discount
Sample Homework Assignments & Research Topics
Tags:
Best Ideas for Research Paper Topics in,
dissertation assignment help UAE,
Dissertation Topics for Students in,
Dissertation Writing App,
I need help writing a doctoral thesis online