preview

Company Policy

Better Essays

Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario.

Sunica Music and Movies will be implementing the best and affordable security measure and disaster recovery plan that is available. Our company will install the best firewall and security that will ensure that our customers and our company data are protected. We seek to maintain and recruit customers. We will always maintain confidentiality, availability, intertgity. By doing so, we shall and will keep the best computer systems and security that is available. Our goals are to expand our locations …show more content…

2 Integrity

Give a brief overview of how the policy will provide rules for authentication and verification. Include a description of formal methods and system transactions.

Integrity keeps data pure and trustworthy by protecting system data from intentional or accidental changes. Integrity has three goals to prevent unauthorized users from making modifications to data or programs. To prevent authorized users from making improper or unauthorized modifications. To maintain internal and external consistency of data and programs.

3 Availability

Briefly describe how the policy will address system back up and recovery, access control, and quality of service.

Availability keeps data and resources available for authorized use, especially during emergencies or disasters. This policy will address common challenges to availability. Denial of Service this is due to intentional attacks or because of undiscovered flaws in implementation. The policy will address loss of information system capabilities because of natural disasters. The policy will also focus on equipment failures during normal use.

Disaster Recovery Plan

Due in Week Three: For your selected scenario, describe the key elements of the Disaster Recovery Plan to be used in case of a disaster and the plan for testing the DRP.

1 Risk Assessment

1 Critical business processes

List the mission-critical business systems and services that

Get Access