preview

Information Security Essay

Good Essays

Portfolio Project
Michael Harker
ITS350-1 Information Systems and Security
Colorado State University Global Campus
Dr. Elliott Lynn
09/01/2013

Summary and Explanation of Proposals
In order for ZXY Inc. to make sure that their entire organization is secure, some proposals have been put into place to protect the company. The company needs to make sure that the network, their employee’s, company devices, and communications are secure from the outside world. The proposals that have been put into place cover such areas as: access control methods, authentication, user’s accounts and passwords, cryptography, remote access, network attack mitigation, malware and device vulnerabilities, and web and e-mail attack mitigation. These proposals …show more content…

Access control is used in determining whether or not to grant or deny access to these resources or services to an employee, group of employees or to an entire department. There are four commonly used types of access control methods; however for a smaller company without many employees at this point in time Discretionary Access Control (DAC) would be good starting point for ZXY Inc. Discretionary access control allows the owner of the service or resource to determine who is granted and who is denied access to certain resources. The owner of each resource and service will be given full authority on granting and denying permissions over what they have ownership of. ZXY Inc. does need to make sure that it does not make just one employee the owner of every resource and service. This is done in order to make sure that one potential bad employee doesn't harm the entire company’s information security network with malicious acts. In regards to user accounts and passwords, a few steps should be taken in order to safeguard company information and protect company data. Each individual employee should be given a unique username that will be used as part of the employee's network log on. Each unique username will then be used by the IT department and DAC owner's in order to grant and/or deny permission's. By having unique user names for each employee, the owners

Get Access