preview

Security Administration, Inc.

Decent Essays

Kaplan University
IT286
Unit 9
Jennifer Polisano

To: Mr. Ross, CISCO Web Site 101 West Branch, IN 55545

From: XXX Security Consulting, Inc.

Mr. Ross,

As we discussed previously, this document includes our recommendations for just a few of the security policies that would be useful for your organization. These recommendations are written in a form that will be approved by you and your management and are intended to demonstrate what is needed, not how the policies will be implemented. Procedural documents which will provide step-by-step directions on the implementation of the policies will follow the approval. Due to the time restraint and the increasing focus on vulnerabilities in your security structure, this document only covers four of the areas that will eventually have written security policies. Please be aware that the information contained in this documents is confidential and should not be circulated to anyone who does not have a security position with your organization. Based on our assessment, these four areas will require security policy approval:
I. Authentication
Authentication – the use of a system to allow user’s access to a computer or network based on three factors: something you know, something you have and something you are.
Purpose: A process used to identify someone or something and determine, if they/ it are who they have declared themselves to be. This allows users the access to the files they are meant to have and no

Get Access