Preview
Preview

Technical Security Policy Proposal for Small Company Essay

:: 5 Works Cited
Length: 1062 words (3 double-spaced pages)
Rating: Purple      
Open Document
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

TicTek Inc is a small company with about a hundred employees and one facility. The company sells home security electronics online. The devices are manufactured by a third party company and shipped to TicTek, whereupon they are warehoused until they are purchased through the company’s website. The warehouse staff prepares and ships customer orders in the same facility which houses the office staff and management. TicTek has a few major stockholders, but the majority of the company’s stock is owned by its executives and employees. Due to the online nature of the company’s business dealings, TicTek has placed a high priority on the security of network resources, including vendor data, customer data, high availability, and incident response. Mr. Tic, the CEO, has recently requested a security proposal from the IT department to formally put into place a comprehensive security plan to keep the company’s network secure.
Technical Security Aspects
In creating an effective security policy, it is important to identify what needs to be protected, and the likelihood of attack for each network device. The lifeblood of TicTek is its online sales; therefore it is vital to protect the company’s web servers and payment processing server, bearing in mind confidentiality, integrity, and availability. A vulnerability assessment will need to be conducted before and after technical security measure are in place for the purpose of identifying specific network vulnerabilities. According to Joseph Migga Kizza (2011), “Vulnerability assessment is a periodic process that works on a system to identify, track, and manage the repair of vulnerabilities on the system” (p.139). Thereafter, a vulnerability assessment will be scheduled every six months to ident...


... middle of paper ...


...t of management.




References
Cisco. (2006). How Does RADIUS Work. Retrieved March 29, 2014 from http://www.cisco.com/c/en/us/support/docs/security-vpn/remote-authentication-dial-user-service-radius/12433-32.html#intro
Kizza, J. (2011). Computer network security and cyber ethics. (3rd ed.). Jefferson: McFarland & Company Inc.
Massachusetts Institute of Technology. (n.d.). Viruses, Spyware, and Malware. Retrieved March 29, 2014 from http://ist.mit.edu/security/malware
Securities and Exchange Commission. (2003). SEC Interpretation: Electronic Storage of Broker-Dealer Records. Retrieved March 29, 2014 from http://www.sec.gov/rules/interp/34-47806.htm
SeverCheck.com. (n.d.). Best Practices for Data Center Infrastructure and Server Room Environmental Monitoring. Retrieved March 29, 2014 from http://www.serverscheck.com/sensors/temperature_best_practices.asp



Click the button above to view the complete essay, speech, term paper, or research paper








This essay is 100% guaranteed.


Title Length Color Rating  
The Valdez Team Essay - The Valdez Team The Valdez Team – a purposefully assembled, seasoned group of business and academic partners with demonstrated expertise and experience in a complete range of engineering, research, and technical activities involving aging structures – is pleased to submit the following proposal for providing such support to the U.S. Air Force Academy and the Center for Aircraft Structural Life Extension (CAStLE). On our team, Valdez International Corporation (Valdez), the prime contractor, is joined by the National Institute for Aviation Research (NIAR), NDE Services, Inc....   [tags: Business Proposal] 1780 words
(5.1 pages)
Powerful Essays [preview]
Solving HealthCare’s eMail Security Problem Essay - Solving HealthCare’s eMail Security Problem Abstract While healthcare organizations have come to depend heavily on electronic mail, they do so without a significant email security infrastructure. New Federal law and regulation place new obligations on the organizations to either secure their email systems or drastically restrict their use. This paper discusses email security in a healthcare context. The paper considers and recommends solutions to the healthcare organization’s problem in securing its mail....   [tags: essays research papers] 6605 words
(18.9 pages)
Strong Essays [preview]
RED CHEETAH Web Site Proposal Essay - Overview This proposal responds to RED CHEETAH’S desire to procure a Web site provider to design the front end of the Web sites for their customers who want to establish on online store with RED CHEETAH’s e-commerce capabilities. The sites will include professionally written content and expertly designed graphics that together present a professional and credible store image. The goal of each site is to immediately capture site visitors’ attention, introduce them to the company, and showcase the variety of merchandise available....   [tags: Business Proposal] 1690 words
(4.8 pages)
Powerful Essays [preview]
Essay about Information Technology for Small Business - Before start the discussion of how IT behave in small business, let us look at the definition of IT. IT ,short for "information technology", is a term that includes all forms of technology used to create, store, exchange, and use information in its various forms such as business data, voice conversations, still images, motion pictures, multimedia presentations, and other forms, including those not yet conceived. It's a convenient term for including both telephony and computer technology in the same word (Applegate)....   [tags: IT for Small Business]
:: 14 Works Cited
2725 words
(7.8 pages)
Term Papers [preview]
Essay on Technical Communication and the Computer Programmer - Technical communication is most likely going to be the most difficult part of my professional career as a computer scientist. Writing for this field is similar to other fields since programmers are expected to be able to write documents that are easily understandable by the software users, and are readily usable with technical details for professionals. Programmers must write many documents directed at the non-technical audience which consists of text within programs, read me files, help files, manuals on software use, presentations for clients, and many more....   [tags: Technical Writing] 679 words
(1.9 pages)
Better Essays [preview]
Proposal For A Senior Employment Agency Essay - PROPOSAL FOR A SENIOR EMPLOYMENT AGENCY BY COLORADO SPRINGS EMPLOYMENT INC. INTRODUCTION Grants Request Document Type: National Aging Grant Funding Opportunity Number: HHS-2010-AOA-SL-1007 Opportunity Category: Title IV Discretionary Projects Funding Instrument Type: Cooperative Agreement Expected Number of Awards: 7 Estimated Total Program Funding: 7 Award Ceiling: $100,000 Award Floor: $100,000 Grant Application Due Date: April 21, 2010 Grant Proposal Three page description including the following information: Senior employment agency details of funds requested Detail need for service Expected impact of senior employment in the area Stated goals and objectives Ti...   [tags: Business Proposal]
:: 8 Works Cited
2345 words
(6.7 pages)
Powerful Essays [preview]
Proposal for a Sustainable Forestry Management Policy Essay - Proposal for a Sustainable Forestry Management Policy Forests are an invaluable natural resource with multiple conflicting uses. When left to stand, forests help conserve biodiversity, stabilize the environment and control erosion; when logged, they provide building materials, fuel and agricultural land for human use. The challenge is to find an equilibrium between these uses: in other words, to make the transition toward sustainable forestry management. Unfortunately, poverty has driven people in developing countries to clear-cut large tracts of land, while instability and corruption have rendered developing country governments powerless to stop illegal logging and trade in illegal forest...   [tags: Proposal Proposition Essays]
:: 10 Works Cited
757 words
(2.2 pages)
Better Essays [preview]
Essay Information Security - Introduction The first thing that we must consider about Information Security is that there is not a final destination at which we can arrive. IT Security is an ongoing set of processes and activities that requires attention and expertise on a daily basis. It is important to understand that systems are not secured by themselves and it is our responsibility to maintain and improve them periodically as required. It is of vital importance to establish the appropriate mechanisms and requirements in order to support the company’s CIA triad....   [tags: IT Security]
:: 6 Works Cited
2693 words
(7.7 pages)
Research Papers [preview]
Information Security Essay - Why do we need management’s support for information security. Doesn’t IT own information security. The technical side is important, but management’s role cannot be overlooked. Thornton states that management has to drive information security. Why does management need to drive this policy. The management team is legally responsible for any breaches that occur. Plus, senior management has a fiduciary responsibility to the company’s assets. Our management can provide the necessary resources, including finances and personnel, needed to implement policy....   [tags: Information Security Essays] 2590 words
(7.4 pages)
Strong Essays [preview]
Business Proposal Essay - Business Proposal In today’s busy world where time is precious to everybody; getting readymade food at the door steps is everyone’s wish. That’s the precise reason anyone from small restaurant to the biggest have home food delivery service. Everyone have their own choice in foods and eat different stuff at different time. Even In same family someone may want pizza for dinner, someone want subway sandwich, and someone may want Mexican food. In such situation when everyone in family want different stuff to eat at same time; you may end up spending lots of time going through different food menus, calling different restaurants, putting up separate orders and wait to get all orders delivered so...   [tags: Business Proposal] 434 words
(1.2 pages)
Strong Essays [preview]