Introduction to Security Essay

733 Words Dec 4th, 2012 3 Pages
Associate Level Material
Appendix C

Introduction

Student Name:

University of Phoenix

IT/244 Intro to IT Security

Instructor’s Name:

Date: October 28, 2012

Introduction

Due in Week One: Give an overview of the company and the security goals to be achieved.

1 Company overview

As relates to your selected scenario, give a brief 100- to 200-word overview of the company.

Sunica Music and Movies is the company that I have chosen. Working independent of one another, the four locations cannot effectively service their costumer’s needs when it comes to inventory and special items, which is causing the stores to lose money due to the lack of good communication between each of the
…show more content…
(Protect, Preserve and Promote)

3 Security policy goals

As applies to your selected scenario, explain how the confidentiality, integrity, and availability principles of information security will be addressed by the information security policy.

1 Confidentiality

Briefly explain how the policy will protect information.

The company will need to set up passwords for all users and also only upper management and the financial personnel will be the only ones to access the important information meaning that only certain users should be given enough privilege to perform their duties, and no more. These users would be the ones to find out who their customers are including the names and addresses, so that they can send out any specials and coupons that the company is offering. This would fall under the CIA concept.

2 Integrity

Give a brief overview of how the policy will provide rules for authentication and verification. Include a description of formal methods and system transactions.

There would be no public information for just anyone to see. There would be a password set up and a security code in order to get any information about a customer. In order to prevent people that are not authorized from changing any information in the system, the managers will have elevated authorization levels. Passcodes and or digital signatures

Related Documents