Monday, May 18, 2020

Information Security And Computer Usage Essay - 1704 Words

TECHNOCRACY â€Å"NO GOD OR KINGS. ONLY MAN.† MEMORANDUM TO: Dan Brown, VP of Technocracy DATE: 10/6/16 CC: Stan Lee, President of MultiGame FROM: Domenick Perrino, Director of Information and Computer Technology SUBJECT: Information security and computer usage policies This memo presents the plans for the revision of information security and computer usage polices for Technocracy. The memo will outline discovered security issues and new policies including additional steps, goals and obstacles when implementing them. Previous security issues discovered Security compromises were discovered in information and computer security after the hack of MultiGame’s Mi-Play. This resulted in multiple lawsuits and loss of customers because customer private information was disclosed. These previous security issues were lack of: †¢ Information security and computer usage polices †¢ Secure passwords. †¢ Encryption. †¢ Employee/User restriction. †¢ Security features to block pirated software. To prevent a similar situation from occurring to Technocracy the new polices were created based on the discovered security compromises. New polices and benefits Secure passwords: Password policy: Requires all employees to create or change passwords to meet specific requirements. This policy will establish Technocracy with secure passwords and protect all Technocracy accounts from unauthorized access. (US-Cert Publication, 2016) Encryption: Encryption policy: Encryption established onShow MoreRelatedPolicy For Employee Internet Usage924 Words   |  4 PagesPolicy for Employee Internet Usage Organizations should have a good training policy and an information systems usage contract. Having a good training plan should include educating employees on the legal and ethical concerns of internet and email usage. It should introduce specific laws and business policies and procedures. It should also identify the ramifications of not following laws and policies. It might also be important for training to identify any security protective measures in placeRead MoreThe Security Related Information For Kashyap Technologies1248 Words   |  5 Pagesthe Security related information for Kashyap Technologies. The security plan for the company-wide information provides coverage of all security controls applicable within Ketch(Kashyap Technologies). Who should use this document? All the employees/contractors/guest/visitors , who will be using the network of the organization to send or receive data. This document states employee and users responsibility while using the allocated resources as detailed by the division of Information Security at KtechRead MoreJob Case Study1619 Words   |  7 Pagesthe size and scope of the company, the option exists to simply not have IT Security Personnel and operate using Gmail and a platform like Google Business to communicate and manage projects involving multiple employees and locations. This works well for some companies, but for others, it could be viewed as unprofessional to not have their own dedicated email service and business software. It also puts company information on a 3rd party platform and could involve other various risks and legal aspectsRead MoreImplementing A Company s Security Plan Essay1089 Words   |  5 PagesAssignment- Security Jean Robert Robillard BUSN624: Principles of E-Commerce APUS Professor: Alex Lazio 11/27/16 Weekly Assignment-Security 1. Identify and describe the five main steps in establishing a company’s security plan? The IT department of e-commerce firms must have a security plan to protect the technologies and assess the risks. Laudon and Traver identify five steps in establishing and assessing the company’s security plan. The followings are the steps: risk assessment, security policyRead MoreData Analysis And Storage Of Information Technology1482 Words   |  6 Pages Abstract Emergence of information technology by mid 20th century has greatly impacted the society. Information sharing has grown with voluminous data being accessed through cloud computing and efficient user interface. This has not only improved interaction between computer user but also users among users themselves. Meta data analysis and storage of information have become a vital component in business intelligence with most firms, organizations reporting increased mobile application installationRead MoreCode Of Conduct And Its Effects On The Organization1723 Words   |  7 Pageshave the usage of IT system needs to have policies in place that specify all the actions needed to deal with certain problems. Disaster Recovery Policy This is a plan of what to do when things go wrong for example acts of theft, loss of data or natural disasters such as fire or earthquake. This might have an impact on the organisation’s business function or security. Updating of security procedures The organisation needs to update their security policies as this is vital. The security featuresRead MoreCode Of Conduct And Its Effects On The Organization1617 Words   |  7 Pageshave the usage of IT system needs to have policies in place that specify all the actions needed to deal with certain problems. Disaster Recovery Policy This is a plan of what to do when things go wrong for example acts of theft, loss of data or natural disasters such as fire or earthquake. This might have an impact on the organisation’s business function or security. Updating of security procedures The organisation needs to update their security policies as this is vital. The security featuresRead MoreThe Characteristics Of Information Security1156 Words   |  5 Pages1. Select one of the three characteristics of information security (CIA) and explain its importance as related to the development of policy, education, OR technology. The key characteristic of the information security CIA triad I will focus on is confidentiality. Confidentiality is an important part of any organization’s business operations and every precaution must be taken to safeguard information so that it doesn’t get into the wrong hands. In today’s world of career hackers and large, cybercriminalRead MoreEffect of Computers on Human Society Essay example605 Words   |  3 PagesThe early computer development began in the late 60’s, at that time their common use was for complex mathematical calculations, and were mostly used by government corporations. As time went on computers became widely popular, and they were being used at a personal level. The Apple Lisa Computer was the first successful personal computer with a GUI interface which was introduced in 1983. Nowadays computers have become extremely popular, and they are being almost everywhere. We are becoming overwhelminglyRead MoreTaking a Look at Cyber Crime 680 Words   |  3 Pagesheinous act that interferes with the functioning of the computer networks by exposing the users of the networks together with the systems to risks. The act is committed intentionally with the objective of creating interruptions that disrupt the normal functioning of the system. Computer users feel the harm directly or through a second party depending on the nature of the tool used in committing the crime (Hull and Sivanesar, 2013, p 98). Computer users across the globe are facing threat, due to the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.