Preview
Preview

Technical Security Policy Proposal for Small Company Essay

:: 5 Works Cited
Length: 1062 words (3 double-spaced pages)
Rating: Purple      
Open Document
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

TicTek Inc is a small company with about a hundred employees and one facility. The company sells home security electronics online. The devices are manufactured by a third party company and shipped to TicTek, whereupon they are warehoused until they are purchased through the company’s website. The warehouse staff prepares and ships customer orders in the same facility which houses the office staff and management. TicTek has a few major stockholders, but the majority of the company’s stock is owned by its executives and employees. Due to the online nature of the company’s business dealings, TicTek has placed a high priority on the security of network resources, including vendor data, customer data, high availability, and incident response. Mr. Tic, the CEO, has recently requested a security proposal from the IT department to formally put into place a comprehensive security plan to keep the company’s network secure.
Technical Security Aspects
In creating an effective security policy, it is important to identify what needs to be protected, and the likelihood of attack for each network device. The lifeblood of TicTek is its online sales; therefore it is vital to protect the company’s web servers and payment processing server, bearing in mind confidentiality, integrity, and availability. A vulnerability assessment will need to be conducted before and after technical security measure are in place for the purpose of identifying specific network vulnerabilities. According to Joseph Migga Kizza (2011), “Vulnerability assessment is a periodic process that works on a system to identify, track, and manage the repair of vulnerabilities on the system” (p.139). Thereafter, a vulnerability assessment will be scheduled every six months to ident...


... middle of paper ...


...t of management.




References
Cisco. (2006). How Does RADIUS Work. Retrieved March 29, 2014 from http://www.cisco.com/c/en/us/support/docs/security-vpn/remote-authentication-dial-user-service-radius/12433-32.html#intro
Kizza, J. (2011). Computer network security and cyber ethics. (3rd ed.). Jefferson: McFarland & Company Inc.
Massachusetts Institute of Technology. (n.d.). Viruses, Spyware, and Malware. Retrieved March 29, 2014 from http://ist.mit.edu/security/malware
Securities and Exchange Commission. (2003). SEC Interpretation: Electronic Storage of Broker-Dealer Records. Retrieved March 29, 2014 from http://www.sec.gov/rules/interp/34-47806.htm
SeverCheck.com. (n.d.). Best Practices for Data Center Infrastructure and Server Room Environmental Monitoring. Retrieved March 29, 2014 from http://www.serverscheck.com/sensors/temperature_best_practices.asp



Click the button above to view the complete essay, speech, term paper, or research paper








This essay is 100% guaranteed.


Title Length Color Rating  
The Valdez Team Essay - The Valdez Team The Valdez Team – a purposefully assembled, seasoned group of business and academic partners with demonstrated expertise and experience in a complete range of engineering, research, and technical activities involving aging structures – is pleased to submit the following proposal for providing such support to the U.S. Air Force Academy and the Center for Aircraft Structural Life Extension (CAStLE). On our team, Valdez International Corporation (Valdez), the prime contractor, is joined by the National Institute for Aviation Research (NIAR), NDE Services, Inc....   [tags: Business Proposal] 1780 words
(5.1 pages)
Powerful Essays [preview]
Solving HealthCare’s eMail Security Problem Essay - Solving HealthCare’s eMail Security Problem Abstract While healthcare organizations have come to depend heavily on electronic mail, they do so without a significant email security infrastructure. New Federal law and regulation place new obligations on the organizations to either secure their email systems or drastically restrict their use. This paper discusses email security in a healthcare context. The paper considers and recommends solutions to the healthcare organization’s problem in securing its mail....   [tags: essays research papers] 6605 words
(18.9 pages)
Strong Essays [preview]
Proposal for Networks in a Small Office Essay - This proposal is for a small office that will have users who are connected by Wi-Fi or cable. The network will include devices and resources that is shared among all the users. The network will need to have security measures in place to protect the entire network and keep the wireless access secure and available only to employees of the company. I would suggest conducting a site survey before finalizing a network layout. A site survey will aid with determining where the wireless access points will be placed to give reliable coverage....   [tags: wireless, security, servers]
:: 1 Works Cited
552 words
(1.6 pages)
Strong Essays [preview]
Malaysian Small and Medium Enterprises Essay - SMALL and medium enterprises (SMEs) are broadly defined as manufacturing, manufacturing-related services (MRS) and agro-based industries that employ around 200 full-time employees or have annual sales turnover of not more than RM50mil (Chermaine, 2013). Besides, the term also refer to enterprises in the services, primary agriculture and information and communication technology industries with not more than 75 full-time employees or annual sales turnover of not more than RM20mil. According to the SME Annual Report 2012, small and medium enterprises represent 98.5% of the approximately 78,000 companies in Malaysia, with the remaining 1.5% made up of multinational and public-listed companies....   [tags: Small and Medium Enterprises, Manufacturing] 2581 words
(7.4 pages)
Research Papers [preview]
RED CHEETAH Web Site Proposal Essay - Overview This proposal responds to RED CHEETAH’S desire to procure a Web site provider to design the front end of the Web sites for their customers who want to establish on online store with RED CHEETAH’s e-commerce capabilities. The sites will include professionally written content and expertly designed graphics that together present a professional and credible store image. The goal of each site is to immediately capture site visitors’ attention, introduce them to the company, and showcase the variety of merchandise available....   [tags: Business Proposal] 1690 words
(4.8 pages)
Powerful Essays [preview]
Essay on Technical Escort: Revealed - Technical Escort: Revealed From the creation of the Army’s Technical Escort Unit, there has always been one mission that has never changed; the removal, transportation and disposal of chemical weapons. “The U.S. Army Technical Escort Unit was formed in 1944 and is the longest, continuously active, military chemical unit in existence... The unit was formed as a group of specialist to escort chemical weapons”(Cashman, 2000, p. 104). Although this mission type has not faded, the overall mission of these units has expanded to a larger arena....   [tags: Army's Technical Escort Unit]
:: 3 Works Cited
984 words
(2.8 pages)
Better Essays [preview]
Information Security Officer for Small Pharmacy Essay - ... Vulnerabilities include lack of redundancy and back-ups, inadequate network management, lack of planning and implementation of communications cabling and inadequate incident handling (Mongie 2009). In addition to the threats and vulnerabilities inherited with wired local area networks (LAN) there are many more risks associated with the use of wireless and mobile technologies. The use of laptops, smartphones, and tablets create vulnerabilities that can fall outside our network securities measure....   [tags: medication, duties, threats, physical] 1919 words
(5.5 pages)
Better Essays [preview]
Essay about Information Technology for Small Business - Before start the discussion of how IT behave in small business, let us look at the definition of IT. IT ,short for "information technology", is a term that includes all forms of technology used to create, store, exchange, and use information in its various forms such as business data, voice conversations, still images, motion pictures, multimedia presentations, and other forms, including those not yet conceived. It's a convenient term for including both telephony and computer technology in the same word (Applegate)....   [tags: IT for Small Business]
:: 14 Works Cited
2725 words
(7.8 pages)
Term Papers [preview]
Proposal for a Sustainable Forestry Management Policy Essay - Proposal for a Sustainable Forestry Management Policy Forests are an invaluable natural resource with multiple conflicting uses. When left to stand, forests help conserve biodiversity, stabilize the environment and control erosion; when logged, they provide building materials, fuel and agricultural land for human use. The challenge is to find an equilibrium between these uses: in other words, to make the transition toward sustainable forestry management. Unfortunately, poverty has driven people in developing countries to clear-cut large tracts of land, while instability and corruption have rendered developing country governments powerless to stop illegal logging and trade in illegal forest...   [tags: Proposal Proposition Essays]
:: 10 Works Cited
757 words
(2.2 pages)
Better Essays [preview]
Business Proposal Essay - Business Proposal In today’s busy world where time is precious to everybody; getting readymade food at the door steps is everyone’s wish. That’s the precise reason anyone from small restaurant to the biggest have home food delivery service. Everyone have their own choice in foods and eat different stuff at different time. Even In same family someone may want pizza for dinner, someone want subway sandwich, and someone may want Mexican food. In such situation when everyone in family want different stuff to eat at same time; you may end up spending lots of time going through different food menus, calling different restaurants, putting up separate orders and wait to get all orders delivered so...   [tags: Business Proposal] 434 words
(1.2 pages)
Strong Essays [preview]