Order Number |
78987786755 |
Type of Project |
ESSAY |
Writer Level |
PHD VERIFIED |
Format |
APA |
Academic Sources |
10 |
Page Count |
3-12 PAGES |
Developing Policies and Physical Control Essay
With highly publicized breaches of clients using your PoS technologies, including Target, Delta, Best Buy, and many others, the company is looking to you to specifically do the following:
1) Develop policies, standards, guidelines and procedures to detail what users and administrators can do to maintain the security of the business systems and network. Write one example of each (policy, standard, guideline, procedure) that specifically protects a PoS network. This example should be written so that any client using your PoS technology can adapt the verbiage to their operations.
2) Explain how the growing use of wireless cellular technology has impacted data transmission and how factors, such as location, affect your company’s ability to protect confidential data. Provide examples of how this technology can be used to jam and hack PoS technology.
You work as a Security Analyst for IBM and have been asked to write a briefing on how your company can provide the IT products and services needed by the USAF that provide a layered, or Defense-in-depth, security architecture. Detail how your recommendations will meet the national strategy to deny, deter, deflect, delay and detect cyber-attacks.
1) Healthcare
2) Military drones
3) Social media and online entertainment (e.g., Spotify, Amazon Alexa)
4) Travel
Prioritize often conflicting Information Security requirements; Confidentiality, Integrity, and Availability, and potential options for outsourcing data storage and virtualization. Recommend access control tools and techniques that enhance the CIA requirements for each technology.