Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / The offices have a total of 5,000 employees, and the office technology inventory includes desktops, mobile computers, and wireless devices

The offices have a total of 5,000 employees, and the office technology inventory includes desktops, mobile computers, and wireless devices

Project Management

The offices have a total of 5,000 employees, and the office technology inventory includes desktops, mobile computers, and wireless devices. There is a mix of computers running Windows 8, 9 and 10, and Mac OS X 10.10. Most of the managers have iPhone devices for instant communication, and all employees are provided cell phones. A Windows Active Directory forest with domains is set up for each office, and seven file and print servers are located in the Phoenix office. The Phoenix office also contains two proxy servers, configured as an array, that provide Web cache services and Internet access control for the organization. The majority of applications are Web-based and hosted from the Phoenix office. 

The Phoenix office has an Internet connection to all the remote offices, and the redundancy is extremely important to the company. There are several sensitive applications that all offices use. The management from each office shares application information that is hosted at the corporate office for accounting and reporting purposes.

All employees have Internet access. There is no policy on the use of removable media. Recently several of the branch offices have encountered issues with malware.

Richman hosts an intranet for employees to access information about the company and to enroll in company benefits programs. Richman also hosts an extranet for its business partners.

Due to many recent technology and process improvements within Richman, the corporate security policy is out of date, and each branch office policy differs.

Give a proposal to Richman's senior management addressing two of the points of concern, considering the following:

  1. Richman has 5,000 employees throughout the main office and several branch offices; therefore, you must research solutions and detail the appropriate access controls, including policies, standards, and procedures that define who the users are, what they can do, which resources they can access, and which operations they can perform on a system.
  2. Most of the managers have iPhone devices for instant communications, and all employees are provided cell phones; therefore, you must research and detail the cryptography methods to protect organizational information using techniques that ensure the information's integrity, confidentiality, authenticity, and nonrepudiation, and the recovery of encrypted information in its original form.
  3. There is a mix of computers running Windows 8, 9 and 10, and Mac OS X 10.10; therefore, you must research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses, and other related forms of intentionally created deviant code.
  4. All employees have Internet access to browse the Web, there is no policy on the use of removable media, and several of the branch offices have encountered issues with malware recently; therefore, you must research and formulate a plan to implement monitoring and analysis. You must determine system implementation and access in accordance with defined IT criteria as well as how to collect information for identification of and response to security breaches or events.
  5. Richman hosts an intranet for employees to access information about the company and enroll in company benefits programs, and that Richman also hosts an extranet for its business partners; therefore, you must research and devise a method to secure networks and communications. This should include the network structure, transmission methods and techniques, transport formats, and security measures used to operate both private and public communication networks.
  6. The Phoenix office contains two proxy servers configured as an array, which provide Web cache services and Internet access control for Richman, and the majority of applications are Web-based and hosted from the Phoenix office; therefore, you must assess risk, response, and recovery. Conduct a review of the implementation processes essential to the identification, measurement, and control of loss associated with uncertain events.
  7. The corporate security policy is out of date and each branch office policy differs; therefore, you must research and define security operations and administration, including the identification of information assets and documentation of policies, standards, procedures, and guidelines that ensure confidentiality, integrity, and availability.

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE