StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Creating the report - Research Paper Example

Cite this document
Summary
vendors who have access to the organization’s information security and forensic laboratory. The scope of this policy will also…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.2% of users find it useful
Creating the report
Read Text Preview

Extract of sample "Creating the report"

Full Paper Policy Development Network Access Scope This policy is applicable to all other departments that are internally connected, the organization, remote branches, employees and third parties i.e. vendors who have access to the organization’s information security and forensic laboratory. The scope of this policy will also cover all the legacy and future equipment that will be configured and tuned as per the reference documentations. If any other laboratories exist in the organization will be exempted from the scope of this policy and will be treated as per the specific policy if available.

PolicyOwnership ResponsibilitiesAssociated managers are liable for aligning security policies of the laboratory in compliance with the organization security policies. The following policies are vital: Password policy of networking devices and hosts, wireless network security policy, Anti-Virus security policy and physical security policy.The network support staff or administration must monitor and maintain a firewall between the network that connects the production functions, processes and operations from the laboratory network or network appliance / equipment / device (Frye, 2007).

The network support staff or administration must be entitled to have full rights for interrupting network connections of the laboratory that may impose impact or security risk on processes, functions and operation on the production network (Frye, 2007).Universal Configuration NecessitiesThe network traffic between the organization and the other networks will be transmitted via a firewall monitored and maintained by the support staff. However, in case of a wireless network transmission, connection to other networks of the organization will be prohibited.

In order to configure or modify any configuration settings on the firewall must be reviewed and approved by the information security personnel.Right to audit for all inbound and outbound activities of the organization is applicable to the information security personnel anytime. For ensuring physical access, every employee or student must identify themselves via physical security controls before entering in the organization is mandatory.Encryption must be applicable to stored password files, VPN connections and connections to the third party service providers where applicable.

Enforcement(Business,) If any violation of this policy is found, the matter maybe subjected to disciplinary action including termination of employment.Revision HistoryVersion 1.02 Policy Development Operating System ControlPolicyOwnership ResponsibilitiesAssociated managers are liable for ensuring adequate control for operating system and compliance with the organizational policies. The network support staff or administration must monitor and maintain the operating system controlThe network support staff or administration must be entitled to have full rights for modifying controls only if changes are mandatory and will impact business processes.3.2.

Universal Configuration NecessitiesIn order to configure or modify any control of operating system must be reviewed and approved by the associated information system owner.Right to audit for all inbound and outbound activities of the organization is applicable to the information security personnel anytime. 3.3. EnforcementIf any violation of this policy is found, the matter maybe subjected to disciplinary action including termination of employment.4. Revision HistoryVersion 1.03 Policy Development Database Server ControlPolicyOwnership ResponsibilitiesAssociated managers are liable for ensuring adequate control for database and compliance with the organizational policies.

The network support staff or database administration must monitor and maintain the database on periodic basis.The network support staff or database administration must be entitled to have full rights for modifying controls only if changes are mandatory and will impact business processes.3.4. Universal Configuration NecessitiesIn order to configure or modify any data residing in the database server must be reviewed and approved by the associated database owner.Right to audit for all inbound and outbound activities of the organization is applicable to the information security personnel anytime. 3.5.

EnforcementIf any violation of this policy is found, the matter maybe subjected to disciplinary action including termination of employment.5. Revision HistoryVersion 1.0ReferencesFrye, D. (2007). Network security policies and procedures . New York: Springer Science+Business Media. Business, &. L. R.Essential safety policies Business & Legal Reports, Inc.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Creating the report Research Paper Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1605419-creating-the-report
(Creating the Report Research Paper Example | Topics and Well Written Essays - 500 Words)
https://studentshare.org/information-technology/1605419-creating-the-report.
“Creating the Report Research Paper Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1605419-creating-the-report.
  • Cited: 0 times

CHECK THESE SAMPLES OF Creating the report

In Her Own Words: Women Offenders' View on Crime and Victmization by Alarid and Cromwell

But the face-to-face interview report says that the victimized women were more exploited than the criminalized women.... In the book, In Her Own Words: Women Offenders' Views on Crime and Victimization Alarid and Cromwell have reduced the literature use of words and phrases in order to make it more meaningful to the students....
5 Pages (1250 words) Book Report/Review

One Flew Over the Cuckoos Nest and The Bell Jar

hese infringements of accepted norms and conventions result in the sanctioned quarantine of them from society at large, effectively creating a false bifurcation meant to imply that reality can be found in the mores, values and behaviour condoned outside the walls of the hospital....
9 Pages (2250 words) Book Report/Review

HRM practice in other countries

This report… Emirates Telecommunication Corporation-Estisalat was established in1976 as the joint venture between British and local partners.... Estisalat is a UAE-based telecommunication service corporation which has successfully expanded its service area across Asian, middle-east, and African regions....
5 Pages (1250 words) Lab Report

Reading report

The book is a loopy essay series of short repeated tunes on the subject of villainy: celebrity gossip villainy, demonic villainy, heroic villainy, villainy theory pop villainy, as well as rock bands, which… This paper is looks into the third chapter of the book.... In the chapter, the writer talks about some democratic leadership, which has been brought about by a Batman's existence....
1 Pages (250 words) Book Report/Review

Hospitality leadership reflection assignment

the report explores how the principles of Define and Refine, Deliver Wow!... The book The New Gold Standard: 5 Leadership Principles for creating Legendary Customer Experience Courtesy of The Ritz-Carlton Hotel Company by Joseph Michelli, focus on the Ritz-Carlton Hotel Company, and the Gold Standard application and experience....
5 Pages (1250 words) Book Report/Review

Social Engineering

This means that he or she has to find the label close to any one of the input boxes such as E-mail address: or ‘Password' then locate the same label in the source to see the code for the input such… The system has been made immune to attack on the system and data through the enhancement of performance....
4 Pages (1000 words) Lab Report

Computer Use is the New Media Reader of Contemporary Society

the report discusses how the modern informational technology shaped the society.... The following paper will critique a research project based on a book "The Medium is the Message: An Inventory of Effects".... Specifically, the paper investigates the topic of interaction between man and machines....
5 Pages (1250 words) Book Report/Review

Training Program Related with the Safety and Security in the GM Manufacturing Process

The purpose of this report is to develop a training program related to the safety and security in the GM manufacturing process.... This study helps the organization to make its employees more aware of the operational safety.... nbsp;The study starts with a brief overview of the whole training program… The study describes and analyses the Assessment stage of the training program....
8 Pages (2000 words) Book Report/Review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us