6. Addressing security in TIBO a. System Security Policy Review i. Current Syste
ID: 3695938 • Letter: 6
Question
6. Addressing security in TIBO
a. System Security Policy Review
i. Current System Management
ii. User Account Management
iii. Security Plan Updated
1. Network Security and Malicious Software Detection Plans
2. Encryption Management
********access with Web browser
and works used in completing this exercise:
1. Textbook: IT Governance Institute. IT Governance Using COBIT and ValIT: Student Book, 2nd Edition. 2007.
2. Case Study: IT Governance Institute. IT Governance Using COBIT and ValIT: TIBO Case Study, 2nd Edition. 2007.
Explanation / Answer
The above reference books are not available:
System Security Policy Review
Effective security policies are the foundation for an effective security program, as it helps to clarify the security goals of an organization in relation to its business processes, technical mechanisms and personnel behavior. A good security policy can help to ensure that systems are utilized in the intended manner; and control legal liability.
The Policy provides a framework in which security threats to Information Systems can be identified and managed on a risk basis and establishes terms of reference, which are to ensure uniform implementation of Information security controls
We provide expert advice on the development and review of security policies that aim to improve your security practices while minimizing any unnecessary administrative overhead.
Application of this process to security monitoring fits with the Security Management, which seeks to accomplish the following:
Current System Management
User Account Management
Administrators grant security privileges to users by creating roles and assigning those roles to user accounts. You have access to all of the features in Blackboard Learn that your roles allow.
When Blackboard Learn is installed, three user accounts with administrative privileges are created. One of these accounts is called System Administrator. This account is referred to as the default administrator account.
Administrators use the default administrator account to create other user accounts, including other administrator accounts. This allows administrators to delegate certain administrative tasks such as managing user accounts, creating courses, or handling enrollment requests.
Network Security and Malicious Software Detection Plans
Malware and other security threats plague every type of Windows user, and that includes even the most advanced technical IT professional. Infections caused by rootkits, spyware, viruses and any other conceivable type of malware have become inevitable in the enterprise and, as a Windows security professional, you need to know how to prevent these threats from completely corrupting your systems.
Identify the attack
Recently email has been the primary method of the virus distribution, but it is not the only method. The other ways a virus can enter your network environment includes floppy disks, FTP downloads, and HTTP downloads, among others. Most recently virus writers and intrusion experts have been cooperating and developing viral code that enters networks by exploiting known security bugs.
Detecting the infection
In many cases the discussion surrounding the detection of virus infections centers on the activity of antivirus software. What is often overlooked is that if antivirus software can detect an infection or an infection attempt, it can usually deal with the situation effectively. A virus incident will only occur in situations
Encryption Management
Key Manager is an appliance that helps organizations meets compliance requirements with FIPS 140-2 compliant encryption key management. The symmetric encryption key management solution creates, manages, and distributes 128-bit, 192-bit, and 256-bit AES keys for any application or database running on any Enterprise operating system. Alliance Key Manager also supports on-appliance encryption and decryption services. Whether you want to run Alliance Key Manager as a physical hardware security module (HSM), as a VMware instance, or in the vCloud, encryption key management has never been easier.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.