Free

CIS Homework - Case Study Example

Comments (0) Cite this document
Summary
In order to find out the best practices of the information security, I have visited and explored the websites of Microsoft, Oracle, Cisco, IBM and Intel. I have noticed that all of these organizations have developed their own information security best practices or guidelines;…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.8% of users find it useful
CIS Homework
Read TextPreview

Extract of sample "CIS Homework"

Security Best Practices In order to find out the best practices of the information security, I have visited and explored the websites of Microsoft, Oracle, Cisco, IBM and Intel. I have noticed that all of these organizations have developed their own information security best practices or guidelines; moreover, some of these guidelines are same in all organizations whereas the others are specific to the equipment or technology, they have developed. These organizations have developed information security frameworks, security architectures, information security laws, information security policy, the user training and resource (Oracle, 2005). It is pertinent to mention here that the guidelines and best practices varies with respect to the medium or category of the technology; for example, the guidelines for information security of the information systems would be not similar to the best practices or guidelines of the computer network, mobile devices, online collaboration and social sharing, internet protection, electronic device security etc (IBM, n.d).
One of the most common information security best practices that I have found in all the above mentioned websites is to develop strong password protection for logging in / logging out of any system. One of the main reasons for emphasizing the strong passwords is that despite the development and implementation of latest technologies to protect secured information, the information can easily have unauthorized access if the user has not developed a strong password to secure its personal information. Moreover, most of the information leakage is due to the same reason, as a common hacker can attack to the vulnerability of weak password and break into your information.
Works Cited
Oracle. Application Server Security Guide.2005. Web.11 Nov. 2012
IBM. A Best Practices Guide to Information Security. n.d. Web. 11 Nov. 2012 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“CIS Homework Case Study Example | Topics and Well Written Essays - 250 words”, n.d.)
CIS Homework Case Study Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1608205-cis-homework
(CIS Homework Case Study Example | Topics and Well Written Essays - 250 Words)
CIS Homework Case Study Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1608205-cis-homework.
“CIS Homework Case Study Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1608205-cis-homework.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF CIS Homework

Homework

...?The first part of the video lecture defines and demonstrates the botnet, how the botnet are created and infect the computer systems over the internet. A botnet is a collection of infected computers connected to the internet which are being controlled by the Bot herder and command center. It has been found in the video that a Bot client can easily be developed by a Trojan that installs a bot code on the victim’s PC through a compiled and executable source code that can be written in Microsoft Visual C++. It has been learnt from the video through a practical example to control and command the bots through IRC that can be installed on the private server machine and spreading the bots through e-mail attachment, downloading BitTorrent...
4 Pages(1000 words)Essay

Homework

... A comparison between articles on marijuana use Marijuana has been in use by different persons across the globe for various reasons for a long period. Despite this, there have been various regulations that are imposed on its use, depending on the understanding of the health and economic benefits and hazards associated with its use. In this regard, numerous researches have been undertaken on the topic. This paper seeks to compare two articles; ‘Government Study of Marijuana Sees Medical Benefits by Strolberg, Sheryl and ‘Legalizing of Marijuana Raises Health Concerns’ by Rabin, Roni. ‘Government Study of Marijuana Sees Medical Benefits’ by Strolberg presents a research directed by the government in a bid to understand the effects... A...
3 Pages(750 words)Research Paper

CIS

...CIS With the imagination of the human mind, racing at the speed of light it is quite evident how it affects the field of technology. Because of the fast paced human thought process, new technologies emerge everyday. Implementing these, technologies in the socio sphere of life bring along its own issues. The widespread use of technology in day-to-day business has forced experts to look into its pros and cons with some insight. The past few years have seen new trends emerging, better and efficient ways to communicate on a personal as well as social level. These boast about the enormous amount of data that can be shared. Nevertheless, along with it has come the intriguing question of "how safe is it to share" (Martinelli,...
3 Pages(750 words)Essay

Information Technology

...://www.isnare.com/?aid=414907&ca=Business [Accessed Aug 07, 2010]. Kaplan & Garicano., No Date. A Framework for Analyzing B2B E-Commerce.Chicago Booth . [Online] Available at:http://faculty.chicagobooth.edu/steven.kaplan/research/frame.pdf [Accessed Aug 07, 2010]. Solano Community College., No Date. Online Shopping. Workarea. [Online] Available at:http://bcs.solano.edu/workarea/mfracisc/CIS%2066%20Word/Homework%20solutions/Unit%201/U01PA01.pdf [Accessed Aug 07, 2010]. UC Berkeley., No Date. Online Shopping. Intro. [Online] Available at:http://www.ocf.berkeley.edu/~jinnie/ [Accessed Aug 07, 2010].... Technology Table of Contents Table of Contents 2 Introduction 3 E-Commerce or Online Shopping 3 Advantages of Online Retailing over High Street ...
4 Pages(1000 words)Essay

Cis 331

...Icebergs for Kuwait Icebergs for Kuwait Explore the mess by answering the following Questions. What do we know? Freshwater in Kuwait is scarce hence very expensive as stated in Powell and Baker (2010). Desalinating water from sea is quite costly; it requires a lot amount of oil. What can we assume? We will assume that only large towing ships will be rented to carry maximum of 10, 000, 0000. We will also assume that the towing ship can travel at 1, 3, 5 km/hr, iceberg is spherical and melts with a constant radius. What will the results look like? Towing vessel will travel at 5km/hr and the quantity of the iceberg carry from South Pole will be greater than 6,054,466m3. The alternative method will be reasonable and less expensive... for Kuwait...
2 Pages(500 words)Assignment

CIS

...Sherry Turkle: Connected, But Alone? Turkle in the TED.com show talks about how technology has transformed the manner in which people communicate today. The traditional forms of communication where people used to talk face to face or through phone calls have been replaced by new forms of technology through use of text messages, social networks and emails. According to her, this transformation has led to loss of genuine real life conversation converting people into robot- like machines. She asserts that there are features of real conversation that can never be replaced by the electronic communication. These features are what connect people as social beings. It is through real conversation that one can express their real emotions... Turkle:...
2 Pages(500 words)Essay

CIS 599

...The Chief Information Officers Body of Knowledge al Affiliation The Chief Information Officers Body of Knowledge The published book, the chief information officers body of knowledge is the most exciting collection of ideas and insights worthy of a place in a CIO office. The right word that describes the book is a collection since the book is an assemblage of writing from 30 independent contributors organized around three central themes; technology, process and people. The book written by Dean Lane is full of great material offered up in very applicable terms offering the reader every confidence they can borrow or copy the ideas themselves. The author’s idea on the IT role and that of the CIO in the industry is that it is rapidly... Chief...
2 Pages(500 words)Assignment

CIS Questions

...Validating Your Work" Please respond to the following: 7. Describe attribute minimization. Explain what would happen if you tried to vali a page containing instances of attribute minimization. Propose a solution to this problem. 8. There are many reasons to validate your Web design. Select one of these reasons and discuss its importance. "Understanding Validation" Please respond to the following: Attribute maximization is to validate a page for data maximization. When the user inputs data in a webpage, it requires authentication and validation. Additionally, validating a webpage requires a comprehensive encryption and security protocols. 9. From the e-Activity, identify a business of your choice (school, bank, law office, travel... Your Work" ...
4 Pages(1000 words)Coursework

CIS

...CIS Part My experience working for an organization offered new insight and practical involvement in theimplementation of a new system. Participating as part of the software design and development and implementation team, both the functional and non-functional requirements for the system had to be gathered for the organization, Virtusa. The organization is a profit oriented tech-firm that was looking to install a new computer system for its clients. The firm in this instantiated example of the project proves that the failure of the project was due to the requirements deficiencies. The practical case problem presented is that of a software corporation called Virtusa which released a software program application for its...
1 Pages(250 words)Essay

CIS

... College: Computer Programming Preheat the oven to 350 degrees. In a bowl, cream some butter, brown sugar, and white sugar together. Beat in the pudding mix until it is blended (Allrecipes.com, n.d). This recipe step exhibits both a sequence and iteration control structures. The first two steps exhibit a sequence control structure while the last step manifests an iterative approach. 2) 1. Database Administrator - Design and operations of a database 2. Help Desk - End-user oriented 3. System Programmer - Improve mainframe performance 4. Network Manager- Set up and manage network 5. System Operator - Day-to-day computer operations C++ Programming Language C++ is a cross-platform, multi-purpose computer programming language... College: Computer ...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic CIS Homework for FREE!

Contact Us