Need help writing 9 page papaper, I do not know where to even start. Please sele
ID: 3802889 • Letter: N
Question
Need help writing 9 page papaper, I do not know where to even start.
Please select either your current organization, or UMES and pick 5 IT Security concerns and write an effective security policy for each of the 5. Policies should be written so that they all follow a similar format. In addition to writing the policies, please write a synopsis as to why you chose those specific policies, and the reasoning behind the policy details you selected by using facts, statistics, and convincing arguments (good area for citation usage). For this section, your target audience would be the C-level employees for your organization who would ultimately approve these policies, so please be convincing.
Examples of policies would be (just examples, please select any 5 you want, but identify a security need and be convincing).
-Password Policy
-User Access Policy
-Data classification policy
Explanation / Answer
Five IT security concerns are -
1 - Denial of service attack
2 - Spoofing
3 - Tampering
4 - Eavesdropping
5 - Phishing
Policy for these concerns are ---
1 - Denial of service attack - Purchase a lot of bandwidth. This may be the easiest solution, but it is also the most expensive. If an enterprise has tons of bandwidth, it makes perpetrating a DoS attack much more difficult, as it's more bandwidth that an attacker has to clog.
Reason for choosing - this is the easiest method.
2- Spoofing - Protection against spoofing requires that you perform some basic sanity checks. Sanity checks are just quick inspections of source and destination IP addresses as traffic ingresses and egresses your network at key choke points.
Reason for choosing - these are just inspection and can be done by anyone .no need for any experts in this .
3 - Tampering - Backups. Backups are used to ensure data which is lost can be recovered from another source. It is considered essential to keep a backup of any data in most industries and the process is recommended for any files of importance to a user.
Reason for choosing - this is the basic step which is almost done by every user just they don not have knowledge as to why thet did it.
4 - Eavesdropping - Encryption. Encryption is a great defence against eavesdropping. By only using applications and systems which use strong encryption, you can make an attacker's life far more difficult.
Reason for choosing - this is simple the best defevce against eavesdropping.
5 - Phishing - Never send your details in email. THE TRAP: You receive an urgent email that appears to be from CSS-IT asking you to reply with your password because your account is "compromised" or "over quota" or "suspended due to inactivity".
YOUR DEFENSE: UC Berkeley and organizations that care about the protection of your information should never ask you to send bank account numbers, Social Security Numbers, driver's license numbers, health information, or health insurance information via email. Decline requests to send this information in email.
Reason for choosing - this is the basic method and just an awareness among individual .
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.