Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

6. Addressing security in TIBO a. System Security Policy Review i. Current Syste

ID: 3695938 • Letter: 6

Question

6. Addressing security in TIBO
a. System Security Policy Review
i. Current System Management
ii. User Account Management
iii. Security Plan Updated
1. Network Security and Malicious Software Detection Plans
2. Encryption Management

********access with Web browser
and works used in completing this exercise:
1. Textbook: IT Governance Institute. IT Governance Using COBIT and ValIT: Student Book, 2nd Edition. 2007.
2. Case Study: IT Governance Institute. IT Governance Using COBIT and ValIT: TIBO Case Study, 2nd Edition. 2007.

Explanation / Answer

The above reference books are not available:

System Security Policy Review

            Effective security policies are the foundation for an effective security program, as it helps to clarify the security goals of an organization in relation to its business processes, technical mechanisms and personnel behavior. A good security policy can help to ensure that systems are utilized in the intended manner; and control legal liability.

            The Policy provides a framework in which security threats to Information Systems can be identified and managed on a risk basis and establishes terms of reference, which are to ensure uniform implementation of Information security controls

            We provide expert advice on the development and review of security policies that aim to improve your security practices while minimizing any unnecessary administrative overhead.

Application of this process to security monitoring fits with the Security Management, which seeks to accomplish the following:

Current System Management

User Account Management

            Administrators grant security privileges to users by creating roles and assigning those roles to user accounts. You have access to all of the features in Blackboard Learn that your roles allow.

            When Blackboard Learn is installed, three user accounts with administrative privileges are created. One of these accounts is called System Administrator. This account is referred to as the default administrator account.

            Administrators use the default administrator account to create other user accounts, including other administrator accounts. This allows administrators to delegate certain administrative tasks such as managing user accounts, creating courses, or handling enrollment requests.

Network Security and Malicious Software Detection Plans

            Malware and other security threats plague every type of Windows user, and that includes even the most advanced technical IT professional. Infections caused by rootkits, spyware, viruses and any other conceivable type of malware have become inevitable in the enterprise and, as a Windows security professional, you need to know how to prevent these threats from completely corrupting your systems.

Identify the attack

            Recently email has been the primary method of the virus distribution, but it is not the only method. The other ways a virus can enter your network environment includes floppy disks, FTP downloads, and HTTP downloads, among others. Most recently virus writers and intrusion experts have been cooperating and developing viral code that enters networks by exploiting known security bugs.

Detecting the infection

            In many cases the discussion surrounding the detection of virus infections centers on the activity of antivirus software. What is often overlooked is that if antivirus software can detect an infection or an infection attempt, it can usually deal with the situation effectively. A virus incident will only occur in situations

Encryption Management

            Key Manager is an appliance that helps organizations meets compliance requirements with FIPS 140-2 compliant encryption key management. The symmetric encryption key management solution creates, manages, and distributes 128-bit, 192-bit, and 256-bit AES keys for any application or database running on any Enterprise operating system. Alliance Key Manager also supports on-appliance encryption and decryption services. Whether you want to run Alliance Key Manager as a physical hardware security module (HSM), as a VMware instance, or in the vCloud, encryption key management has never been easier.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote