Assignment

Read Complete Research Material



Assignment

Assignment

Destruction, Retention, Sharing, and Use of Finman's Corporate Data

Training of Communications Awareness for all users would be the initial step to ensure safeguard and smooth operations of network assets. This will contain Information Assurance (IA), which is the essential training for prevention of threat and computer throughout the relocation to implementation of AD and CAC card. An agreement of user and request access form from network supervisor would be presented for all clients with verification of training of Information Assurance. It would affirm penalties and responsibilities of user for said agreement violation. Datanal would give resources for training and documentation to be provided to all Finman companies (Hiles, 2002). Secondly, the management of risk will consist of the creation on processes of auditing, backup of data, and strategies for recovery. Modification and Evaluation of current Host Intrusion Detection System (HIDS), and software for detection of virus have to be completed. In absence of any of these systems the implementation plan will be set up. Systems for recovery and backup of data will be assessed to contain complete solution with the plans for establishment of recovering data and processes for restore. This will contain documents of all records of any tasks of security, associated threats or risks, and audit logs. A program for data storage/ retention that state the time period in which the storing of date take place and eventually disposition of data should be set up (Weil, 2010).

Thirdly, devices of hardware for example proxy firewalls, routers, firewalls, firewalls based on computer and Intrusion Detection System (IDS) and Intrusion Prevention Systems (IPS) have to be at all sites and in place to ensure the information system infrastructure is well guarded against potential threats from external networks. Routers and firewall will be used for encrypting data that is going ...