Order For Similar Custom Papers & Assignment Help Services

Fill the order form details - writing instructions guides, and get your paper done.

Posted: February 28th, 2023

In this activity, you will develop a laptop organizational security policy and evaluate whether it meets the needs of the organization in the face of incidents which occur after the policy has been implemented. assignment

Description: In this activity, you will develop a laptop organizational security policy and evaluate whether it meets the needs of the organization in the face of incidents which occur after the policy has been implemented.ObjectivesCompany policies define, at a high level, how an organization will fulfill its mission. Procedures specify how company policies will be implemented For example, a policy may state that users will be authenticated by a two-factor authentication method, whereas a related procedure may detail what specific smart cards will be used, how to configure the certificate server, what types of digital certificates will be used, and so on.Developing policy and procedure may not be as captivating as developing software or engineering network infrastructure, but it is just as important. Without clear, complete and appropriate policies and procedures, business would be haphazard, training of new employees would be inconsistent, and realistic goals for product and/or service quality would not likely be met. Moreover, regulatory and legal mandates would most likely be violated.After completing this lab, you will be able to:Develop a company laptop policyWrite my Essay Online Writing Service with Professional Essay Writers – Explain how policies contribute to the achievement of an organization’s missionEvaluate a policy’s effectiveness and applicability and modify the policy as neededMaterials RequiredThis lab requires the following:Computer with lnternet accessActivityIn this lab, you create a corporate policy for the management and use of laptops.1. Review the following background information about the hypothetical company for which you will design a laptop policy.The Acme Printing and Publishing Company has corporate offices in New York City and regional offices in Scranton, Buffalo, and Baltimore. The company designs and prints internal publications for large corporations and for various U.S. government agencies. Much of the work product is considered highly classified by the company’s clients, and the Acme Information Technology and Security departments implement strong access controls.There are 250 employees in the corporate office and 75 employees in each regional office.Top-level management has decided to issue company laptops to 100 users (executives, quality control, and sales employees).The company laptops will be used to connect (a) to the corporate network via wired or wireless connections when in corporate locations, (b) to the Internet through an Internet service provider with which Acme has contracted, and (c) to the corporate network via VPN from remote locations.All laptops will run Windows 7 Enterprise Edition, Microsoft office 2010, and several line-of-business applications. All network servers run Windows Server 2008.

2. You are tasked with developing a policy that governs the management and use of laptops. Consider both the company background described in Step 1 and what you have learned about information security during your security course. Take into account threats, risks, vulnerabilities, consequences (should a threat occur), and available security controls. Be sure to consider both technical (enforceable) and social (unenforceable) controls. Consider methods to assure compliance with your policy. Create an outline for the security section of the laptop policy. You should break the security section into specific areas, such as Physical Security, Access Control, and so on. For example, one of the entries under the Physical Security heading might be “All laptops will have a bar coded identification tag firmly affixed.”Create the outline for your laptop policy using sources such as your course textbook and the lnternet. Only when you have completed your policy outline should you go on to Step 3.3. Do not continue with this step until you have completed Step 2. Your laptop policy has been implemented and the company laptops have been issued. Your manager informs you that the following issue has been reported. A company sales employee, who was onsite at a client company’s location, connected his laptop to the client’s network to download documents and the proprietary software program required to view them. The employee was unable to install the program and got an error message stating that he did not have the rights required to install the program and referring him to the Acme systems administrator.Does your laptop policy address this issue? If not, revise your policy so that it does. If so, was the response the user received when trying to install the software consistent or inconsistent with your policy?4. Several weeks later your manager reported another incident. An employee used her company laptop to connect to a wireless hot spot at a coffee shop in an airport. The next day, she reported that her laptop was behaving oddly; programs were taking a long time to run, and when working on a Microsoft Word file, the document suddenly went blank and the file, which she was sure she had saved earlier, could not be found on her system. Later, from her home, she connected to the corporate network through her VPN connection. The next day, the log files of the remote access server and of the antivirus hardware/software showed that her laptop had been infected by a well-known virus and that an attempt had been made, during her VPN connection the previous day, to infect her office workstation with the same virus. The employee was clearly distraught, and there is no suspicion that this was a deliberate attack on her part.Does your laptop policy address these issues? If not, revise your policy so that it does. If so, was the user’s experience with the use of the wireless hot spot and the infection of the laptop by a well-known virus consistent with your policy? Does your policy address the attempt by the laptop to infect the employee’s office workstation via the remote access server? If not, revise your policy so that it does. If so, was the outcome consistent with your policy?5. Submit your laptop policy outline (including revisions based on steps 3 and 4) to your instructor.

.doc file

Order | Check Discount

Tags: Best Ideas for Research Paper Topics in, dissertation assignment help UAE, Dissertation Topics for Students in, Dissertation Writing App, I need help writing a doctoral thesis online

Assignment Help For You!

Special Offer! Get 20-25% Off On your Order!

Why choose us

You Want Quality and That’s What We Deliver

Top Skilled Writers

To ensure professionalism, we carefully curate our team by handpicking highly skilled writers and editors, each possessing specialized knowledge in distinct subject areas and a strong background in academic writing. This selection process guarantees that our writers are well-equipped to write on a variety of topics with expertise. Whether it's help writing an essay in nursing, medical, healthcare, management, psychology, and other related subjects, we have the right expert for you. Our diverse team 24/7 ensures that we can meet the specific needs of students across the various learning instututions.

Affordable Prices

The Essay Bishops 'write my paper' online service strives to provide the best writers at the most competitive rates—student-friendly cost, ensuring affordability without compromising on quality. We understand the financial constraints students face and aim to offer exceptional value. Our pricing is both fair and reasonable to college/university students in comparison to other paper writing services in the academic market. This commitment to affordability sets us apart and makes our services accessible to a wider range of students.

100% Plagiarism-Free

Minimal Similarity Index Score on our content. Rest assured, you'll never receive a product with any traces of plagiarism, AI, GenAI, or ChatGPT, as our team is dedicated to ensuring the highest standards of originality. We rigorously scan each final draft before it's sent to you, guaranteeing originality and maintaining our commitment to delivering plagiarism-free content. Your satisfaction and trust are our top priorities.

How it works

When you decide to place an order with Dissertation App, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.