Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Introduction Star Gold is a small to medium sized enterprise that offers a range of software development and networking solutions. The company wish to develop

Introduction

Star Gold is a small to medium sized enterprise that offers a range of software development and networking solutions. The company wish to develop an Information Security Policy (ISP) to safeguard both the company and its employees from computer and Internet misuse.

Background

The Star Gold management have become increasingly aware that they face considerable risk from external and internal threats. They presently have only the generic acceptable use policy and mainly rely on their employees doing the right thing. This has become unacceptable and Gold Star need an ISP that serves to define exactly what employees can and cannot do (and the other issues that an ISP should define).

Technical Details

Star Gold have a mail server, web server and application server, serving a number of applications and software development platforms. They currently carry out all network management manually and have no automated configuration control facility, relying heavily on the developers and consultants to manage change within their working environment. There are the 3 servers mentioned, a router, a firewall and 60 host devices (including printers, network printers etc.).

Their infrastructure provides security through a firewall and the following traffic has been observed during the security audit: HTTP, FTP, TFTP, SMTP, DNS. They use DHCP to assign all IP addresses on the LAN and for Internet access use dynamic NAT for all hosts on the network (with the exception of those that will not require Internet access). The servers, printers and non-pc hardware have static addresses that have been excluded from the dynamic DHCP pool and are currently using allocated static addresses.

Gold Star found that they are continually upgrading and replacing equipment, either due to performance or reliability issues. They currently hire a skip and dump the obsolete equipment, or ask a local PC salvage firm to take the decommissioned hardware offsite.

As this is an IT Security Policy that will go out to all staff, the company have decided not to include technical details of the IP addresses and configuration details from the security audit.

Requirements

You have been commissioned to write an Information Security Policy (ISP) for their organisation.

Acceptable Use Policy Propose the acceptable use policy, including at least the following points. What are the general rules and guidelines for each policy? Provide at least 5 points for each policy (given questions are provided for guidance only).

  1. Passwords policy (given questions are provided for guidance only).What are the policy rules for passwords? How to identify strong/weak password?
  2. Privileges policy (given questions are provided for guidance only).Who is granting the privileges? How users can elevate their own privileges?
  3. Computer Software policy (given questions are provided for guidance only).Who can install new software? What kind of software needs to be installed?

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Administrator Limited Edition

Authors: Martif Way

1st Edition

B0CGG89N8Z

More Books

Students also viewed these Databases questions

Question

Why do HCMSs exist? Do they change over time?

Answered: 1 week ago