Home » Downloads » Security

Security

security

I’m attaching the pdf file to get the information and attach another file of similar work that i need it to be done in the same way.

You are the security manager for a mid-sized company (3,000 to 5,000 employees). Your company has determined that confidentiality (or privacy) and data integrity are the security services you must provide to your work force. 10% of the work force handles company sensitive information, which requires additional security protection. The remainder of the work force must also protect their data, but not to the same level of protection or assurance.

Your assignment is to review the Verisign CPS and recommend the type of certificate(s) (e.g., Class 1) needed for your workforce. Provide a rationale with your recommendation. As the security manager, you also need to ensure cost is kept to a minimum. Even though the CPS does not include cost information, you can find cost data on the Internet. Additionally, you need to identify the security challenges of implementing a Verisign-based solution, as well as the security features provided by this solution.

You also need to identify the security features described in the CPS that support the security requirements for this company.

Hint: Use the Verisign CPS on Bb and select the technical capabilities and security services desired for a specific environment (e.g., financial institution, health care, etc.). Also identify the planning considerations using the CPS and your class notes. You do not need to include detailed cost information, estimates.

Note: Symantec purchased Verisign. Check their website for cost information.

 

 

……………………Answer preview…………………………

At the current state of technology improvement, there is that risk of that any information that is shared from one computer system to the across different internet networks is at risk of being hacked and manipulated for personal benefits, (In Nepal and Pathan, 2013). In the case of mid-sized organizations, there is that risk that any information that is confidential and vital to such organizations might end up in the wrong hands. This is why monitoring and verification of all the data that goes through the employees’ computer system is important to the management to avoid loss of any important data, (Stavroulakis and Stamp, 2010). There is security software that has been developed to provide protection to large and small businesses as a result of increased cases of computer crime…………………………….

 

 

APA

1600 words

Accounting

Applied Sciences

Article Writing

Astronomy

Biology

Business

Calculus

Chemistry

Communications

Computer Science

Counselling

Criminology

Economics

Education

Engineering

English

Environmental

Ethics

Film

Food and Nutrition

Geography

Healthcare

History and Government

Human Resource Managment

Information Systems

Law

Literature

Management

Marketing

Mathematics

Nursing

Philosophy

Physics

Political Science

Psychology

Religion

Sociology

Statistics

Writing

Terms of service

Contact