Intro to Info Security

In: Computers and Technology

Submitted By micahclark66
Words 364
Pages 2
Multi-Layered Security Plan
User Domain
Risk, Threat, or Vulnerability: Lack of awareness, Apathy toward policies, Security policy violations, Personal CD’s and USB drives with photos, music and videos, Download photos, music and videos, Destruction of systems, applications, or data, Employee blackmail or extortion.
Mitigation: Conduct annual security awareness training, Place employee on probation, Disable internal CD drives and USB ports, Enable content filtering. Restrict user access, Track and monitor abnormal employee behavior, Enable Intrusion detection system/Intrusion prevention system (IDS/IPS).
Workstation Domain
Risk, Threat, or Vulnerability: Unauthorized access to workstation, Unauthorized access to systems, applications, and data, Desktop or Laptop computer operating system software vulnerabilities, Viruses, malicious code or malware infects a workstation or laptop.
Mitigation: Enable password protection, Define strict access control policies, standards, procedures and guidelines, Use workstation antivirus and malicious code policies,
LAN Domain
Risk, Threat, or Vulnerability: Unauthorized access to LAN, Unauthorized access to system, applications, and data, LAN server operating system/application software vulnerabilities, Rogue users on WLANs gain unauthorized access.
Mitigation: Define strict access control policies, standards, procedures and guidelines, Make sure wiring closets, data centers, and computer rooms are secure.
LAN to WAN Domain
Risk, Threat, or Vulnerability: Unauthorized network probing and port scanning, Unauthorized access, IP router, firewall, and network appliance configuration file errors or weaknesses.
Mitigation: Disable ping, probing, and port scanning on all exterior IP devices, Apply strict security monitoring controls, Define a strict zero day vulnerability window definition.
WAN Domain (Internet)
Risk, Threat,…...

Similar Documents

Intro to Info Security Project Part 1

...User Domain Risk, Threat, or Vulnerability Lack of user awareness • Conduct security awareness training display security awareness posters, insert reminders in banner greetings, and send e-mail reminders to employees. User apathy toward policies • Conduct annual security awareness training, implement acceptable use policy, update staff manual and handbook, discuss dring performance reviews. Workstation Domain Risk, Threat, or Vulnerability Unauthorized access to workstation • Enable password protection on workstations for access. Enable auto screen lockout for inactive time. Unauthorized access to systems, applications, and data • Define strict access control policies, standards, procedures, and guidelines. Implement a second-level test to verify a user’s right to gain access. Account Policies | Password, lockout, and Kerberos settings. | Local Policies | Audit, user rights, and security options. ("Security Options" consist primarily of security-relevant registry values.) | Event Log | Settings for system, application, security and directory service logs. | Restricted Groups | Policy regarding group membership. | System Services | Startup modes and access control for system services. | Registry | Access control for registry keys. | File System | Access control for folders and files. | LAN Multilayer Security * Coverage considerations for wireless LAN (WLAN) users in a branch office * Distance considerations from the closet to......

Words: 726 - Pages: 3

Cmgt 400 Entire Course (Intro to Info Assurance & Security) Complete Course

...CMGT 400 Entire Course (Intro to Info Assurance & Security) Complete Course http://uopguides.com/downloads/cmgt-400-entire-course-intro-info-assurance-security-complete-course/ Visit Website For More Tutorials : http://uopguides.com Email Us for Any Question or More Final Exams at : Uopguides@gmail.com WEEK 1 Week 1 DQ 1 Post a 150-200-word response to the following discussion question by clicking on Reply. What is the mindset required to properly protect information? What role does reasoned paranoia play in the minded and how can an individual keep the proper balance between protecting information and enabling business? Week 1 DQ 2 How can information be an asset in a company? Discuss three different examples of information that should be protected by a company and not exposed. Include several examples of what management could do to protect each example. CMGT 400 Week 1 Kudler Fine Foods IT Security Report & Presentation-Kudler System Review, CMGT 400 Week 1-Ind. Assignment Risky Situations, Week 2 Week 2 DQ 1 Post a 150-200-word response to the following discussion question by clicking on Reply. Why do you think one of the methods in the Heimerl (2010) article would be the most effective way for an organization to save money? Week 2 DQ 2 Which of the threats from social networking in the Horn (2010) article also apply to other businesses? Which do not? Why do you think so? CMGT 400 Week 2 Assignment-Kudler Fine Foods IT Security Report &......

Words: 630 - Pages: 3

Cmgt 400 Entire Course (Intro to Info Assurance & Security) Complete Course

...CMGT 400 Entire Course (Intro to Info Assurance & Security) Complete Course http://uopguides.com/downloads/cmgt-400-entire-course-intro-info-assurance-security-complete-course/ Visit Website For More Tutorials : http://uopguides.com Email Us for Any Question or More Final Exams at : Uopguides@gmail.com WEEK 1 Week 1 DQ 1 Post a 150-200-word response to the following discussion question by clicking on Reply. What is the mindset required to properly protect information? What role does reasoned paranoia play in the minded and how can an individual keep the proper balance between protecting information and enabling business? Week 1 DQ 2 How can information be an asset in a company? Discuss three different examples of information that should be protected by a company and not exposed. Include several examples of what management could do to protect each example. CMGT 400 Week 1 Kudler Fine Foods IT Security Report & Presentation-Kudler System Review, CMGT 400 Week 1-Ind. Assignment Risky Situations, Week 2 Week 2 DQ 1 Post a 150-200-word response to the following discussion question by clicking on Reply. Why do you think one of the methods in the Heimerl (2010) article would be the most effective way for an organization to save money? Week 2 DQ 2 Which of the threats from social networking in the Horn (2010) article also apply to other businesses? Which do not? Why do you think so? CMGT 400 Week 2 Assignment-Kudler Fine Foods IT Security Report &......

Words: 630 - Pages: 3

Cmgt 400 Entire Course (Intro to Info Assurance & Security) Complete Course

...CMGT 400 Entire Course (Intro to Info Assurance & Security) Complete Course http://uopguides.com/downloads/cmgt-400-entire-course-intro-info-assurance-security-complete-course/ Visit Website For More Tutorials : http://uopguides.com Email Us for Any Question or More Final Exams at : Uopguides@gmail.com WEEK 1 Week 1 DQ 1 Post a 150-200-word response to the following discussion question by clicking on Reply. What is the mindset required to properly protect information? What role does reasoned paranoia play in the minded and how can an individual keep the proper balance between protecting information and enabling business? Week 1 DQ 2 How can information be an asset in a company? Discuss three different examples of information that should be protected by a company and not exposed. Include several examples of what management could do to protect each example. CMGT 400 Week 1 Kudler Fine Foods IT Security Report & Presentation-Kudler System Review, CMGT 400 Week 1-Ind. Assignment Risky Situations, Week 2 Week 2 DQ 1 Post a 150-200-word response to the following discussion question by clicking on Reply. Why do you think one of the methods in the Heimerl (2010) article would be the most effective way for an organization to save money? Week 2 DQ 2 Which of the threats from social networking in the Horn (2010) article also apply to other businesses? Which do not? Why do you think so? CMGT 400 Week 2 Assignment-Kudler Fine Foods IT Security Report &......

Words: 630 - Pages: 3

Cmgt 400 (Intro to Info Assurance & Security) Complete Course

...CMGT 400 (Intro to Info Assurance & Security) Complete Course To Buy this Class Copy & paste below link in your Brower http://homeworklance.com/downloads/cmgt-400-intro-info-assurance-security-complete-course/ Or Visit Our Website Visit : http://homeworklance.com Email Us : lancehomework@gmail.com CMGT 400 (Intro to Info Assurance & Security) Complete Course CMGT 400 WEEK 1 Week 1 DQ 1 Post a 150-200-word response to the following discussion question by clicking on Reply. What is the mindset required to properly protect information? What role does reasoned paranoia play in the minded and how can an individual keep the proper balance between protecting information and enabling business? Week 1 DQ 2 How can information be an asset in a company? Discuss three different examples of information that should be protected by a company and not exposed. Include several examples of what management could do to protect each example. CMGT 400 Week 1 Kudler Fine Foods IT Security Report & Presentation-Kudler System Review, CMGT 400 Week 1-Ind. Assignment Risky Situations, Week 2 Week 2 DQ 1 Post a 150-200-word response to the following discussion question by clicking on Reply. Why do you think one of the methods in the Heimerl (2010) article would be the most effective way for an organization to save money? Week 2 DQ 2 Which of the threats from social networking in the Horn (2010) article also apply to other businesses? Which do not? Why do you think......

Words: 3835 - Pages: 16

Cmgt 400 Intro to Info Assurance & Security Complete Class

...CMGT 400 Intro to Info Assurance & Security Complete Class To Buy this Tutorial Copy & paste below link in your Brower http://studentoffortune.biz/downloads/cmgt-400-intro-info-assurance-security-complete-class/ Or Visit Our Website Visit : www.studentoffortune.biz Email Us : studentoffortunetutorials@gmail.com CMGT 400 Intro to Info Assurance & Security Complete Class WEEK 1 Week 1 DQ 1 Post a 150-200-word response to the following discussion question by clicking on Reply. What is the mindset required to properly protect information? What role does reasoned paranoia play in the minded and how can an individual keep the proper balance between protecting information and enabling business? Week 1 DQ 2 How can information be an asset in a company? Discuss three different examples of information that should be protected by a company and not exposed. Include several examples of what management could do to protect each example. CMGT 400 Week 1 Kudler Fine Foods IT Security Report & Presentation-Kudler System Review, CMGT 400 Week 1-Ind. Assignment Risky Situations, Week 2 Week 2 DQ 1 Post a 150-200-word response to the following discussion question by clicking on Reply. Why do you think one of the methods in the Heimerl (2010) article would be the most effective way for an organization to save money? Week 2 DQ 2 Which of the threats from social networking in the Horn (2010) article also apply to other businesses? Which do not? Why do you think so...

Words: 5725 - Pages: 23

Cmgt 400 Intro to Info Assurance & Security Entire Course

...CMGT 400 Intro to Info Assurance & Security Entire Course To Download This Tutorial Visit below Link http://www.studentsoffortunes.com/downloads/cmgt-400-intro-info-assurance-security-entire-course/ (Product Type) : Instant Downloadable We invite you to browse through our store and shop with confidence. We invite you to create an account with us if you like, or shop as a guest. Either way, your shopping cart will be active until you leave the store. All Tutorials will be E-mailed immediately after the Payment, Please Check your inbox or Spam Folder and can also be downloaded by clicking on Tutorial Bucket. For Any Other Inquiry Feel Free to Contact us: studentsoffortunes@gmail.com For More Tutorials Visit: ( http://www.studentsoffortunes.com/ ) (Product Description) WEEK 1 Week 1 DQ 1 Post a 150-200-word response to the following discussion question by clicking on Reply. What is the mindset required to properly protect information? What role does reasoned paranoia play in the minded and how can an individual keep the proper balance between protecting information and enabling business? Week 1 DQ 2 How can information be an asset in a company? Discuss three different examples of information that should be protected by a company and not exposed. Include several examples of what management could do to protect each example. CMGT 400 Week 1 Kudler Fine Foods IT Security Report & Presentation-Kudler System Review, CMGT 400 Week 1-Ind.......

Words: 708 - Pages: 3

Cmgt 400 (Intro to Info Assurance & Security) Complete Course

...CMGT 400 (Intro to Info Assurance & Security) Complete Course To Buy this Class Copy & paste below link in your Brower http://homeworklance.com/downloads/cmgt-400-intro-info-assurance-security-complete-course/ Or Visit Our Website Visit : http://homeworklance.com Email Us : lancehomework@gmail.com CMGT 400 (Intro to Info Assurance & Security) Complete Course CMGT 400 WEEK 1 Week 1 DQ 1 Post a 150-200-word response to the following discussion question by clicking on Reply. What is the mindset required to properly protect information? What role does reasoned paranoia play in the minded and how can an individual keep the proper balance between protecting information and enabling business? Week 1 DQ 2 How can information be an asset in a company? Discuss three different examples of information that should be protected by a company and not exposed. Include several examples of what management could do to protect each example. CMGT 400 Week 1 Kudler Fine Foods IT Security Report & Presentation-Kudler System Review, CMGT 400 Week 1-Ind. Assignment Risky Situations, Week 2 Week 2 DQ 1 Post a 150-200-word response to the following discussion question by clicking on Reply. Why do you think one of the methods in the Heimerl (2010) article would be the most effective way for an organization to save money? Week 2 DQ 2 Which of the threats from social networking in the Horn (2010) article also apply to other businesses? Which do not? Why do you think......

Words: 8308 - Pages: 34

Cmgt 400 Intro to Info Assurance & Security Complete Class

...CMGT 400 Intro to Info Assurance & Security Complete Class To Buy this Tutorial Copy & paste below link in your Brower http://studentoffortune.biz/downloads/cmgt-400-intro-info-assurance-security-complete-class/ Or Visit Our Website Visit : www.studentoffortune.biz Email Us : studentoffortunetutorials@gmail.com CMGT 400 Intro to Info Assurance & Security Complete Class WEEK 1 Week 1 DQ 1 Post a 150-200-word response to the following discussion question by clicking on Reply. What is the mindset required to properly protect information? What role does reasoned paranoia play in the minded and how can an individual keep the proper balance between protecting information and enabling business? Week 1 DQ 2 How can information be an asset in a company? Discuss three different examples of information that should be protected by a company and not exposed. Include several examples of what management could do to protect each example. CMGT 400 Week 1 Kudler Fine Foods IT Security Report & Presentation-Kudler System Review, CMGT 400 Week 1-Ind. Assignment Risky Situations, Week 2 Week 2 DQ 1 Post a 150-200-word response to the following discussion question by clicking on Reply. Why do you think one of the methods in the Heimerl (2010) article would be the most effective way for an organization to save money? Week 2 DQ 2 Which of the threats from social networking in the Horn (2010) article also apply to other businesses? Which do not? Why do you think so...

Words: 6997 - Pages: 28

Cmgt 400 Intro to Info Assurance & Security Entire Course

...CMGT 400 Intro to Info Assurance & Security Entire Course To Download This Tutorial Visit below Link http://www.studentsoffortunes.com/downloads/cmgt-400-intro-info-assurance-security-entire-course/ (Product Type) : Instant Downloadable We invite you to browse through our store and shop with confidence. We invite you to create an account with us if you like, or shop as a guest. Either way, your shopping cart will be active until you leave the store. All Tutorials will be E-mailed immediately after the Payment, Please Check your inbox or Spam Folder and can also be downloaded by clicking on Tutorial Bucket. For Any Other Inquiry Feel Free to Contact us: studentsoffortunes@gmail.com For More Tutorials Visit: ( http://www.studentsoffortunes.com/ ) (Product Description) WEEK 1 Week 1 DQ 1 Post a 150-200-word response to the following discussion question by clicking on Reply. What is the mindset required to properly protect information? What role does reasoned paranoia play in the minded and how can an individual keep the proper balance between protecting information and enabling business? Week 1 DQ 2 How can information be an asset in a company? Discuss three different examples of information that should be protected by a company and not exposed. Include several examples of what management could do to protect each example. CMGT 400 Week 1 Kudler Fine Foods IT Security Report & Presentation-Kudler System Review, CMGT 400 Week 1-Ind.......

Words: 2829 - Pages: 12

Cmgt 400 Intro to Info Assurance & Security Entire Course to Download This Tutorial Visit Below Link Http: //Www.Studentsoffortunes.Com/Downloads/Cmgt-400-Intro-Info-Assurance-Security-Entire-Course/ (Product Type) :

...CMGT 400 Intro to Info Assurance & Security Entire Course To Download This Tutorial Visit below Link http://www.studentsoffortunes.com/downloads/cmgt-400-intro-info-assurance-security-entire-course/ (Product Type) : Instant Downloadable We invite you to browse through our store and shop with confidence. We invite you to create an account with us if you like, or shop as a guest. Either way, your shopping cart will be active until you leave the store. All Tutorials will be E-mailed immediately after the Payment, Please Check your inbox or Spam Folder and can also be downloaded by clicking on Tutorial Bucket. For Any Other Inquiry Feel Free to Contact us: studentsoffortunes@gmail.com For More Tutorials Visit: ( http://www.studentsoffortunes.com/ ) (Product Description) WEEK 1 Week 1 DQ 1 Post a 150-200-word response to the following discussion question by clicking on Reply. What is the mindset required to properly protect information? What role does reasoned paranoia play in the minded and how can an individual keep the proper balance between protecting information and enabling business? Week 1 DQ 2 How can information be an asset in a company? Discuss three different examples of information that should be protected by a company and not exposed. Include several examples of what management could do to protect each example. CMGT 400 Week 1 Kudler Fine Foods IT Security Report & Presentation-Kudler System Review, CMGT 400 Week 1-Ind.......

Words: 708 - Pages: 3

Cmgt 400 (Intro to Info Assurance & Security) Complete Course

...CMGT 400 (Intro to Info Assurance & Security) Complete Course Get Tutorial by Clicking on the link below or Copy Paste Link in Your Browser http://hwguiders.com/downloads/cmgt-400-intro-info-assurance-security-complete-course/ For More Courses and Exams use this form ( http://hwguiders.com/contact-us/ ) Feel Free to Search your Class through Our Product Categories or From Our Search Bar (http://hwguiders.com/ ) CMGT 400 (Intro to Info Assurance & Security) Complete Course CMGT 400 WEEK 1 Week 1 DQ 1 Post a 150-200-word response to the following discussion question by clicking on Reply. What is the mindset required to properly protect information? What role does reasoned paranoia play in the minded and how can an individual keep the proper balance between protecting information and enabling business? Week 1 DQ 2 How can information be an asset in a company? Discuss three different examples of information that should be protected by a company and not exposed. Include several examples of what management could do to protect each example. CMGT 400 Week 1 Kudler Fine Foods IT Security Report & Presentation-Kudler System Review, CMGT 400 Week 1-Ind. Assignment Risky Situations, Week 2 Week 2 DQ 1 Post a 150-200-word response to the following discussion question by clicking on Reply. Why do you think one of the methods in the Heimerl (2010) article would be the most effective way for an organization to save money? Week 2 DQ 2 Which of the......

Words: 11899 - Pages: 48

Cmgt 400 Intro to Info Assurance & Security Entire Course

...CMGT 400 Intro to Info Assurance & Security Entire Course http://www.projbid.com/downloads/cmgt-400-intro-info-assurance-security-entire-course/ WEEK 1 Week 1 DQ 1 Post a 150-200-word response to the following discussion question by clicking on Reply. What is the mindset required to properly protect information? What role does reasoned paranoia play in the minded and how can an individual keep the proper balance between protecting information and enabling business? Week 1 DQ 2 How can information be an asset in a company? Discuss three different examples of information that should be protected by a company and not exposed. Include several examples of what management could do to protect each example. CMGT 400 Week 1 Kudler Fine Foods IT Security Report & Presentation-Kudler System Review, CMGT 400 Week 1-Ind. Assignment Risky Situations, Week 2 Week 2 DQ 1 Post a 150-200-word response to the following discussion question by clicking on Reply. Why do you think one of the methods in the Heimerl (2010) article would be the most effective way for an organization to save money? Week 2 DQ 2 Which of the threats from social networking in the Horn (2010) article also apply to other businesses? Which do not? Why do you think so? CMGT 400 Week 2 Assignment-Kudler Fine Foods IT Security Report & Presentation-Top Threats CMGT 400 Week 2 Individual Assignment-Common Information Security Threats (1100+ Words) Week 3 Week 3 DQ 1 What are three of the controls in...

Words: 606 - Pages: 3

Cmgt 400 Intro to Info Assurance & Security

...CMGT 400 Intro to Info Assurance & Security http://www.tutoriallance.com/shop/uncategorized/cmgt-400-intro-to-info-assurance-security/ For any inquiry email us: Tutoriallance@gmail.com Visit Website For More Tutorials : http://www.tutoriallance.com/ WEEK 1 Week 1 DQ 1 Post a 150-200-word response to the following discussion question by clicking on Reply. What is the mindset required to properly protect information? What role does reasoned paranoia play in the minded and how can an individual keep the proper balance between protecting information and enabling business? Week 1 DQ 2 How can information be an asset in a company? Discuss three different examples of information that should be protected by a company and not exposed. Include several examples of what management could do to protect each example. CMGT 400 Week 1 Kudler Fine Foods IT Security Report & Presentation-Kudler System Review, CMGT 400 Week 1-Ind. Assignment Risky Situations, Week 2 Week 2 DQ 1 Post a 150-200-word response to the following discussion question by clicking on Reply. Why do you think one of the methods in the Heimerl (2010) article would be the most effective way for an organization to save money? Week 2 DQ 2 Which of the threats from social networking in the Horn (2010) article also apply to other businesses? Which do not? Why do you think so? CMGT 400 Week 2 Assignment-Kudler Fine Foods IT Security Report & Presentation-Top Threats CMGT 400 Week 2 Individual......

Words: 624 - Pages: 3

Cmgt 400 Intro to Info Assurance & Security

...CMGT 400 Intro to Info Assurance & Security http://www.tutoriallance.com/shop/uncategorized/cmgt-400-intro-to-info-assurance-security/ For any inquiry email us: Tutoriallance@gmail.com Visit Website For More Tutorials : http://www.tutoriallance.com/ WEEK 1 Week 1 DQ 1 Post a 150-200-word response to the following discussion question by clicking on Reply. What is the mindset required to properly protect information? What role does reasoned paranoia play in the minded and how can an individual keep the proper balance between protecting information and enabling business? Week 1 DQ 2 How can information be an asset in a company? Discuss three different examples of information that should be protected by a company and not exposed. Include several examples of what management could do to protect each example. CMGT 400 Week 1 Kudler Fine Foods IT Security Report & Presentation-Kudler System Review, CMGT 400 Week 1-Ind. Assignment Risky Situations, Week 2 Week 2 DQ 1 Post a 150-200-word response to the following discussion question by clicking on Reply. Why do you think one of the methods in the Heimerl (2010) article would be the most effective way for an organization to save money? Week 2 DQ 2 Which of the threats from social networking in the Horn (2010) article also apply to other businesses? Which do not? Why do you think so? CMGT 400 Week 2 Assignment-Kudler Fine Foods IT Security Report & Presentation-Top Threats CMGT 400 Week 2 Individual......

Words: 624 - Pages: 3