StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Homework - Case Study Example

Comments (0) Cite this document
Summary
As I search for "security best practices", several internet articles had topics on the information security officer, vendor management, as well as physical security. The paper will discuss security best practices with regards to these three topics mentioned above. It will also…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.3% of users find it useful
Homework
Read TextPreview

Extract of sample "Homework"

Homework As I search for "security best practices", several internet articles had topics on the information security officer, vendor management, as well as physical security. The paper will discuss security best practices with regards to these three topics mentioned above. It will also comment on papers that other students have written regarding this topic.
Information Security Officer
The first thing that every security program should do is establish the existence of the Information Security Officer (Putvinski 1). Relying on the size of a person’s security environment, this could be a current worker who has the accessibility to take on further duties or a full-time worker. Apart from the time element, a firm must clearly define the prospects of the Information Security Officer and determine whether a worker is capable of filling the role (Putvinski 1).
Vendor Management
A firm is only as strong and tough as its weakest link, and when the organization works with third-party contributors their information security collapse can become the organization’s issue. Organizations should ensure that they document which vendors get confidential information, in addition to how this information, is taken care of when in the position of the vendor (Putvinski 1). The lack of authoritarian vendor guidelines could raise the risk of releasing a client’s private information.
Physical Security
Documents do not storm out of the organization on their own. Having strict rules regarding who can physically access the offices, as well as how they gain entry, might decrease the possibility that an unauthorized person is present illegally to take information (Putvinski 1). The next step is to make sure that an organization’s documents how physical information is kept and destroyed.
Comments on Papers
Student 1
The issues discussed in student 1’s paper slightly resemble the findings in my paper. Student one talked about security issues with regards to protecting information systems through incorporating security policies. Such a topic is extremely wide in the IT field, and I feel that the student could have explained further as to the types of policies that could be implemented in order to secure our information systems.
Student 2
The second student’s paper was extremely educative. The student focused on the diverse fields of the security best practices touching over every security part that information systems involve. The paper also mentions some of the issues that I discussed in my paper such as physical security, vendor management and information security officers. Such a paper would be extremely helpful to someone who, in particular, wants a summary of the findings on security best practices.
Student 3
The third student, on the other hand, told us of the main components of Microsoft’s program of assessing the environment, as well as protecting networks, severs and client. The student only mentioned this, but it would be better if the student summarized these factors in order for a reader to understand how Microsoft protects its information system.
Student 4
Finally, student four also did a better work just like student two. He explains to the reader of how the NIST document adapted its findings from OECD guidelines and modified the information in the guidelines. The information located on the NIST document are extremely helpful to organizations that use information systems in their dealings, and the fourth student did a marvelous job of explaining this.

Work Cited
Putvinski, Matthew. IT Security Series Part 1: Information Security Best Practices. N.p, 2009. Web. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Homework Case Study Example | Topics and Well Written Essays - 500 words - 1”, n.d.)
Homework Case Study Example | Topics and Well Written Essays - 500 words - 1. Retrieved from https://studentshare.org/information-technology/1605963-homework
(Homework Case Study Example | Topics and Well Written Essays - 500 Words - 1)
Homework Case Study Example | Topics and Well Written Essays - 500 Words - 1. https://studentshare.org/information-technology/1605963-homework.
“Homework Case Study Example | Topics and Well Written Essays - 500 Words - 1”, n.d. https://studentshare.org/information-technology/1605963-homework.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Homework

Homework

...?The first part of the video lecture defines and demonstrates the botnet, how the botnet are created and infect the computer systems over the internet. A botnet is a collection of infected computers connected to the internet which are being controlled by the Bot herder and command center. It has been found in the video that a Bot client can easily be developed by a Trojan that installs a bot code on the victim’s PC through a compiled and executable source code that can be written in Microsoft Visual C++. It has been learnt from the video through a practical example to control and command the bots through IRC that can be installed on the private server machine and spreading the bots through e-mail attachment, downloading BitTorrent...
4 Pages(1000 words)Essay

Homework

... A comparison between articles on marijuana use Marijuana has been in use by different persons across the globe for various reasons for a long period. Despite this, there have been various regulations that are imposed on its use, depending on the understanding of the health and economic benefits and hazards associated with its use. In this regard, numerous researches have been undertaken on the topic. This paper seeks to compare two articles; ‘Government Study of Marijuana Sees Medical Benefits by Strolberg, Sheryl and ‘Legalizing of Marijuana Raises Health Concerns’ by Rabin, Roni. ‘Government Study of Marijuana Sees Medical Benefits’ by Strolberg presents a research directed by the government in a bid to understand the effects... A...
3 Pages(750 words)Research Paper

Homework Debate

... The Case Against Homework Many teachers think that homework is good because they think it reinforces a students learning. I do not feel that way. I believe that homework creates more challenges for a student especially when they have no one to help. When a child enters school, they spend more time in school then they do at home. They have some subjects that are easy for them and others that are very difficult. When they have to take work home, it takes away from the opportunity to rest and relax. All children need the opportunity to move away from school and do something different. I am not sure that there are really positive effects of homework. I know myself that if I understand the class, homework goes very fast. When I do... not, it...
3 Pages(750 words)Essay

Homework

...Homework American Revolution initiated the rebellion against the British colonizers and eventually led to the political and social freedom of the British colonies in the mainland of America. Thesis statement: The wartime experiences of the American Revolution are interconnected with the unification of the people and emergence of civil society, its effects helped the women to gain social status, it helped the slaves to gain confidence and it drastically affected the native population in America. Description and analysis: wartime experiences of the Revolution and the effects on women, slaves, and natives The wartime experiences of the American Revolution are closely related to the direct combat between the revolutionaries... American...
1 Pages(250 words)Essay

Homework

...Homework Homework The economy of the United s has created more than 100,000 job opportunities for the past seven months. However, this is still below the 200,000 required to bring down the rate of unemployment. According to the economic report as per March 2012, the unemployment rate remained at 8.2% (Stewart, 2012). In order to reduce the rate of unemployment from 8.2% to a lower rate, the government requires increasing its spending and lowering the rates of taxation. Through lowering the rate of taxation, individuals will be capable of borrowing at low rates, which will promote the establishment and growth of various businesses that can become sources of employment (Blinder, 2011). In addition, through...
2 Pages(500 words)Essay

Homework

...Homework In the disasters you saw in the photographs, what should the buyer have insisted upon in his/her contract with regard to risk of loss? Explain. Ocean freight has been one of the most utilized modes of shipment throughout the globe as it is cheaper and it can transport any size or weight of goods. Unfortunate for some, this method involves risks such as occurrence of unprecedented disasters, accidents, or malfunctions of these cargo ships. Such cases lead to filing of law suits on the part of the cargo’s insurance companies and on both parties of buyers and sellers. In circumstances such as the ocean disasters reflected in the photographs, the buyer should have included a condition subsequent (Mallor, et al., 2012... In the disasters ...
1 Pages(250 words)Assignment

Homework

...Homework Answers Part One Question Planning for an uncertain situation encompasses a broad process known as contingency planning. This broad process consists of the following components: A plan for incident response A plan for disaster recovery A plan for business continuity These three components account for all-round variables that constitute an uncertain occurrence, thereby informing the planning process for the underlying situation. Question 2 NIST defines a CP process that is made up of seven steps, which include: i. Formulation of a policy statement in relation to contingency planning. ii. Conducting an analysis of business impact. iii. Determination of preventive controls. iv. Development of strategies for...
3 Pages(750 words)Case Study

Homework

...Homework Questions American farmers were faced with various economic and social ills at the turn of the century. Farmers got faced with a banking system that insisted on the gold standard as its monetary system. The railroad system at the time was also deemed as capricious and unfair. The farmers also got faced with rampant land speculation that drove prices for land up. The populist movement referred to the advocacy of the people’s party in 1892 (Roark et al 352). The movement advocated against the industrial society at the time. The movement got based around poor and hard-pressed farmers. The movement called for the formation of a sub treasury, land reform, currency reform, and the empowerment of the common people....
1 Pages(250 words)Coursework

Homework

... Affiliation Cost estimation is an important aspect of project management and determines whether the project is worth undertaking, whether it will be profitable to the company, and if at all the company can afford it (Pinto 2010). It provides the firm with a cost range (“Ball park estimate”) of the total monetary cost of the project. In terms of project schedule and Work breakdown structure, it leads to budgeting for monetary, human and material resources since the management eventually uses these allocations to coordinate the resources to ensure all three are available when needed. Parametric cost estimation works for cost estimation because it is more accurate as compared to analogous cost estimation (Pinto 2010). Considering... Affiliation ...
1 Pages(250 words)Assignment

Homework

...ANSWER SHEET TO THE EXAM SECTION A A 2. B 3. C 4. A 5. A 6. B 7. A 8. B 9. B 10. A SECTION B 11. B 12. C 13. A 14. A 15. D 16. C 17. C 18. E 19. B20. C 21. D 22. A 23. B 24. D 25. B 26. C 27. C 28. E 29. A 30. E SECTION C 31. The universe is normally separated by eight spheres. This is by using the compilation argument. Some of the universe creatures like the moon, sun and stars among with the planet have spheres that rotate with motion. 32. The distance from A to C is longer than the distance from A to B. Mass of B is smaller than the mass in C. The two factors enables the force difference between force exerted on B and C where there is more force exerted on C than in B. This is because force exerted by A to both B and C... SHEET TO THE...
2 Pages(500 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic Homework for FREE!

Contact Us