Submitted by: Submitted by bill74
Views: 1480
Words: 575
Pages: 3
Category: Science and Technology
Date Submitted: 01/11/2011 11:04 PM
Axia College Material
Appendix C
Introduction
Student Name: William Purcell
Axia College
IT/244 Intro to IT Security
Instructor’s Name: Bryan Berg
Date: January 8, 2011
Introduction
Due in Week One: Give an overview of the company and the security goals to be achieved.
1 Company overview
As relates to your selected scenario, give a brief 100- to 200-word overview of the company.
The company that I chose was Sunica Music and Movies they deliver different movies and different types of Music. They are separate and not connected in any way. They have their own systems and don’t have any relation two each other. There are four different businesses. They have no communication too each other on any part of the company. They don’t share any customer information or inventory of any kind. They don’t have the best communication skills of any kind. They are trying to make it simple and connect through the internet so that the customers can see what they have in stock. So that each store can communicate with each other on the internet and know what is going on and what is being sold.
2 Security policy overview
Of the different types of security policies—program-level, program-framework, Issue-specific, and system-specific—briefly cover which type is appropriate to your selected business scenario and why.
The Security that I am going to try is going to be (CIA) Confidentiality, Integrity and Availability.
3 Security policy goals
As applies to your selected scenario, explain how the confidentiality, integrity, and availability principles of information security will be addressed by the information security policy.
1 Confidentiality
Briefly explain how the policy will protect information.
They will need to have a password set up. Only the managers and financial person will be able to see the most important things like who the customers are and how much...