College Pal
Connecting to a pal for your paper
  • Home
  • Place Order
  • My Account
    • Register
    • Login
  • Confidentiality Policy
  • Samples
  • How It Works
  • Guarantees

Sms or Whatsapp only : US:+12403895520

 

email: [email protected]
September 17, 2022

Please is important to refer to the attached document for the powerpoint presentation. Urgently due tomorrow. Module 06 Course Project ? Security Training Program The policies that yo

computer science

 Please is important to refer to the attached document for the powerpoint presentation.

Urgently due tomorrow.

Module 06 Course Project – Security Training Program

The policies that you have created and modified have received final approval from management.

You have been asked to do the following:

  • Develop a security training program for the staff to ensure that the updated and new policies are fully understood.

For this submission, you will:

  • Create a PowerPoint presentation to be used for training the staff.
  • Highlight ALL changes whether they are new policies or changes to existing policies.
  • Provide 10 – 15 slides and include speaker notes.
  • Make your presentation clear and use an appropriate and influential tone to engage staff so that the new policies and changes are easily understood.
  • Use professional language, proper grammar and spelling.
  • attachment

    Summary_Report_Template-mod31.docx

<Project Name> Version: <1.0> Error! Unknown document property name.

Summary Report Module <Insert Module #>

Summary Report – Module 5

Version 1

Prepared By: Jude akassap

Date: 9/11/22

<Project Name> Training Plan Version: <1.0> Error! Unknown document property name.

Revision Date: Error! Unknown document property name. Page 2 of 10

NOT DONE – CDC_UP_Training_Plan_Template.doc

VERSION HISTORY

Version #

Implemented

By

Revision

Date

Approved

By

Approval

Date

Reason

1.0

Jude Akassap

9/11/22

Jay M.

9/11/22

Approve recommendation

TABLE OF CONTENTS

1 Introduction 5

1.1 Purpose 5

2 Executive Summary 5

3 Detailed Summary 5

3.1 LAN Security/Password Policy 5

3.2 Antivirus 5

3.3 Acceptable Use 5

4 Recommendations 5

5 SuggEstED aCTIONS 5

Appendix A: Approval 6

APPENDIX B: REFERENCES 7

APPENDIX C: KEY TERMS 8

Introduction

Purpose

This Summary Report provides a summary of end users security policies updates and recommendations to improve security

Executive Summary

In this report, the end user security policy is examined, and areas where new policies or modifications would be beneficial are noted.

Detailed Summary

LAN Security/Password Policy

While the LAN Security policy section does mention some policy parameters regarding password security, certain aspects are left entirely up to the IT Officers discretion. Password policy guidelines such as the complexity, length, and frequency of use should be detailed for increased security. Many organizations follow a password standard such as NIST

This policy is a bit of a mixed bag when it comes to passwords. It does reference basic parameters about password security such as password complexity, length and frequency of use, but the IT Officers are left entirely on their own in terms of rules regarding components (alphanumeric vs. uppercase vs. lowercase) and rules that may be followed. It's recommended that organizations follow NIST security guidelines such as those outlined in "Guidelines for Developing Security Policies."

The IT Officer in charge will be the primary contact for LAN Security and Password Policy. This can be done by either writing a policy and or delegating this responsibility to an individual or organization. It is recommended that the IT Officer(s) collect information from each employee regarding their password security practices to determine best practices for their organization.

Antivirus

According to the 10.1 Detailed Policy Requirements section, BYOD devices must have antivirus software, however company-owned laptops and other devices are not obliged to have antivirus software. All company-owned devices should come with antivirus software installed, and only IT administrators should be allowed to turn it off. Any software installation should be subject to prior authorization and IT administrative rights. By enabling antivirus and carefully examining software before it is loaded, end device security will be much improved.

Acceptable Use

There is no definition of acceptable use of an organization resource. Implementing firewall rules to ban specific websites and website categories that are regarded inappropriate for the workplace is a good idea. Policies that outline acceptable and undesirable workplace browsing activity should be made available to employees.

Recommendations

This report finds there are several critical issues with the current security policy and recommends the above actions be implemented to increase the overall security of the organization.

· Update LAN security policy- fundamental protections; BitLocker, RAID, Secure Active Directory through monitoring Active connections on internal and external network, leverage encryption across all applications and services, authentication measures, such as hardware tokens or multifactor authentication.

· Update Password policy- requires change every 90-180 days, make minimum of 10 characters in length, include hard-to- Guess factor.

·

SuggEstED aCTIONS

Following these recommendations, new policies ought to be developed and included in the upcoming version of the end user information security policy.

· New guideline policy; for the use of operating systems, browsers and other hardware appliances. That includes 1. No sharing of passwords, PINs or other authentication information with anyone else. 2. Regular reporting of security breaches. 3. Regularly back up all of your personal data and keep it in a safe place in case the worst should happen. 4. Log security alerts and report any new risks as soon as possible

· New information security policy with specifications: new organizational requirements, such as GDPR compliance, no one may access or leave the network without permission, everyone must log in using their own computer, only authorized extensions may be added to existing accounts and all private information should be kept secure. The policy also demands that everyone in the organization, including admins and power users, know and abide by the policies detailed in this document. The benefit is that the updated policy prevents data exfiltration and unauthorized data access, while enhancing the confidentiality, integrity and availability of the existing systems.

Appendix A: Approval

The undersigned acknowledge they have reviewed the and agree with the approach it presents. Changes to this will be coordinated with and approved by the undersigned or their designated representatives.

Signature:

Date:

Print Name:

Jude Akassap

Title:

IT Officer

Role:

Develop, Upgrade, Deploy the infrastructure of the Network, Software, Database

Signature:

Date:

Print Name:

Dene Kinter

Title:

Network System Admin

Role:

Deploy and Maintain the Office LAN Network

Signature:

Date:

Print Name:

Hunt Jamey

Title:

Software QA Analyst

Role:

Maintain, Update, Program the IT software infrastructure

APPENDIX B: REFERENCES

[Insert the name, version number, description, and physical location of any documents referenced in this document. Add rows to the table as necessary. This is where you would want to reference your Risk Register and any other documents that you need to. For the purposes of this class, please include references to course material or outside sources that you are using in your work.]

The following table summarizes the documents referenced in this document.

Document Name and Version

Description

Location

<Document Name and Version Number>

[IT Security Plan]

< https://security.it.iastate.edu/policies/it-security-plan >

APPENDIX C: KEY TERMS

[Insert terms and definitions used in this document. Add rows to the table as necessary. Keep in mind that you are typically writing a summary report for someone who is not familiar with information technology. Be sure to define any terms here that might need to be explained.]

The following table provides definitions for terms relevant to this document.

Collepals.com Plagiarism Free Papers

Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.

Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS

Why Hire Collepals.com writers to do your paper?

Quality- We are experienced and have access to ample research materials.

We write plagiarism Free Content

Confidential- We never share or sell your personal information to third parties.

Support-Chat with us today! We are always waiting to answer all your questions.

Please help me understand the concept by discussing the elements of a security system design and provide practical examples. ?Please provide max 2 page APA format with references not Please list?and elaborate on at least?3 things related to leadership?you learn from verses 5-19 of John 13, where Jesus washes his disciples’ feet. 1 Full Page

Related Posts

computer science

Write a college-level learning narrative about two specific skills or concepts from this course that are useful to a current or future employer. Rese

computer science

You are working as an IT security professional for an organization (called Website 101) that has 300 employees and one large corporate office with th

computer science

Discuss some hardening techniques or products you have used for Workstations List any observations, tips or questions about this lab that would

Why Choose Us

Best Essay Writing Services- Get Quality Homework Essay Paper at Discounted Prices

At the risk of sounding immodest, we must point out that we have an elite team of writers. Ours isn’t a collection of individuals who are good at searching for information on the Internet and then conveniently re-writing the information obtained to barely beat Plagiarism Software. Who can’t do that?

Our writers have strong academic backgrounds with regards to their areas of writing. A paper on History will only be handled by a writer who is trained in that field. A paper on health care can only be dealt with by a writer qualified on matters health care. Thesis papers will only be handled by Masters’ Degree holders while Dissertations will strictly be handled by PhD holders. With such a system, you needn’t worry about the quality of work. Quality isn’t just an option, it is the only option. We don’t just employ writers, we hire professionals.

We have writers spread into all fields including but not limited to Philosophy, Economics, Business, Medicine, Nursing, Education, Technology, Tourism and Travels, Leadership, History, Poverty, Marketing, Climate Change, Social Justice, Chemistry, Mathematics, Literature, Accounting and Political Science.

Our writers are also well trained to follow client instructions as well adhere to various writing conventional writing structures as per the demand of specific articles.

They are also well versed with citation styles such as APA, MLA, Chicago, Harvard, and Oxford which come handy during the preparation of academic papers.

They also have unrivalled skill in writing language be it UK English or USA English considering that they are native English speakers. You also needn’t worry about logical flow of thought, sentence structure as well as proper use of phrases.

Our writers are also not the kind to decorate articles with unnecessary filler words. We respect your money and most importantly your trust in us. In writing, we will be precise and to the point and fill the paper with content as opposed to words aimed at beating the word count.

Our shift-system also ensures that you get fresh writers each time you send a job. This helps overcome occupational hazards brought about by fatigue. Hence, quality will consistently be at the top.

From our writers, you expect; good quality work, friendly service, timely deliveries, and adherence to client’s demands and specifications.

Once you’ve submitted your writing requests, you can go take a stroll while waiting for our all-star team of writers and editors to submit top quality work.

How Our Website Works

Get an Essay from Us

College Essays is the biggest affiliate and testbank for WriteDen. We hire writers from all over the world with an aim to give the best essays to our clients.

Our writers will help you write all your homework. They will write your papers from scratch. We also have a team of editors who read each paper from our writers just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE.

Step 1
To make an Order you only need to click ORDER NOW and we will direct you to our Order Page. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline. Deadline range from 6 hours to 30 days.

Step 2
Once done with writing your paper we will upload it to your account on our website and also forward a copy to your email.

Step 3
Upon receiving your paper, review it and if any changes are needed contact us immediately. We offer unlimited revisions at no extra cost.

Is it Safe to use our services?
We never resell papers on this site. Meaning after your purchase you will get an original copy of your assignment and you have all the rights to use the paper.

Pricing and Discounts
Our price ranges from $8-$14 per page. If you are short of Budget, contact our Live Support for a Discount Code. All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.
Please note we do not have prewritten answers. We need some time to prepare a perfect essay for you.

Recent Posts

  • Create an 8–10 slide presentation for other health care providers in your field that demonstrates ways for professional health care providers to communicate effectively
  • Discuss common protein sources
  • Complete the Typefinder Personality
  • With all the pressure to improve reading achievement
  • Discuss the rise of radical Islam and the flourishing of terror organizations such as ISIS and al-Qaeda
College Pal

All Rights Reserved Terms and Conditions
College pals.com Privacy Policy 2010-2018

Term

Definition

Audit