Nt2580 Week 5 Essay 2

In: Computers and Technology

Submitted By enkioferidu
Words 673
Pages 3
Adhering to a standard in business does a lot of things for your company. First, it allows you to advertise that you reach and maintain such standards. This shows potential and currant customers that you use and adhere to this set of policies and standards and that your activities as a business comply with these set of guidelines. In the cse of E-commerce it would show your customers that you are reliable and safe to deal with when it comes to their financial matters. It shows customers that you hold security of their personal details whether financial or otherwise to a certain height in your business. The PCI DSS website says that compliance with its standards with data security:
“…can bring major benefits to businesses of all sizes, while failure to comply can have serious and long-term negative consequences. Here are some reasons why.”
* Compliance with the PCI DSS means that your systems are secure, and customers can trust you with their sensitive payment card information:
* Trust means your customers have confidence in doing business with you
* Confident customers are more likely to be repeat customers, and to recommend you to others

* Compliance improves your reputation with acquirers and payment brands -- the partners you need in order to do business
* Compliance is an ongoing process, not a one-time event. It helps prevent security breaches and theft of payment card data, not just today, but in the future:
* As data compromise becomes ever more sophisticated, it becomes ever more difficult for an individual merchant to stay ahead of the threats
* The PCI Security Standards Council is constantly working to monitor threats and improve the industry’s means of dealing with them, through enhancements to PCI Security Standards and by the training of security professionals
* When you stay compliant, you are part…...

Similar Documents

Itt Nt2580 Unit 5

...Unit 5 Assignment 1: Testing and Monitoring Security Controls Learning Objectives and Outcomes * You will learn to recognize security events and baseline anomalies that might indicate suspicious activity. * You will learn to identify policy violations and security breaches and to appropriately monitor threats and control activity across the network. Assignment Requirements Refer to the handout Testing and Monitoring Security Controls. It contains information on security events or breaches and baseline anomalies. After studying the handout, answer the following questions: * Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. * Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling and monitoring each incident. Identify the methods to mitigate risk and minimize exposure to threats or vulnerabilities. Required Resources Worksheet: Testing and Monitoring Security Controls (attached) Submission Requirements * Format: Microsoft Word * Font: Arial, Size 12, Double-Space * Length: 1–2 pages * Due By: Unit 6 Self-Assessment Checklist * I have identified at least two security events and baseline anomalies. * I have indicated the best options for controlling and monitoring three of the policy violations and security breaches from the list. * I have identified the methods to mitigate risk and...

Words: 1036 - Pages: 5

Week 5 Lit Essay

...Essay Question BCOM/230 June 25, 2012 Essay Question It is important to use language and words that are culturally correct because words can get “lost” in translation. Words can mean something different The words mean something else in other cultures than in ours. Words and they need to make sure that they be used them properly, so that no one does not is offended affined in the other another culture. It is very important when writing in any business and to make sure that in writing the words in a business communication that the words are it is spelled and ethically correct right for that cultural that is to receive this document. If a client has the information in front of him/her, and they do not understand something they can look the meaning of the words up and understand what the other person is conveying. they are trying to say to him. A business proposal will be better understood if the written agreement between the two parties is conveyed in the context in which it was meant. So it makes a business proposal easier between cultures if they have a written understand of the proposal. This strongly influences ones choice in communication greatly because words they need to be chosen carefully. ones Words and phrases need to get the point across flawlessly without confusing anyone. Today's society and workplace is made up of many cultures, religions, and races so ensuring that the......

Words: 265 - Pages: 2

Itt Nt2580 Lab #5

...Lab #5 1. What is the purpose of the address resolution protocol (ARP)? ARP is a protocol used for resolution of IP addresses into MAC addresses and vice versa. 2. What is the purpose of the dynamic host control protocol (DHCP)? DHCP is used on an IP network to assign IP addresses to computers on the network. This is done without any human intervention. The computer requesting a DHCP-assigned address is given one by the network’s DHCP server within a range of assigned IP addresses which are tracked by the DHCP server. A DHCP-assigned address is normally assigned to a computer for a set lease time and after that lease expires, the computer must renew the IP address or request a new one. 3. What was the DHCP allocated source IP host address for the Student VM and the Target VM? (retracted) 4. When you pinged the targeted IP host, what was the source IP address and destination IP address of the ICMP echo-request packet? Source: 10.134.112.42 (my external IP) Destination: 98.138.253.109 (www.yahoo.com) 5. Did the targeted IP host respond to the ICMP echo-request packet with an ICMP echo-reply packet? If yes, how many ICMP echo-reply packets were sent back to the IP source? Yes, the target did respond with ICMP echo reply packets. My computer sent four request packets and the destination server sent four reply packets back. 6. Find a TCP 3-way handshake for a TELNET, FTP, or SSH session. What is the significance of the TCP 3-way...

Words: 552 - Pages: 3

Unit 5 Nt2580

...Unit 5 Assignment: Acceptable Use Policy (AUP) Definition The Richman”s Investment Group updated (AUP) Acceptable Use Policy for January 2014 for both acceptable and unacceptable use of the Internet use operated or owned by Richman’s Investment. Any violations in this agreement policy may result in disciplinary and/or legal action. Penalties can range from immediate termination of employment to imprisonment with fines. Internet Usage • Any and all employees of Richman’s Investment are encouraged to use the internet where such use is needed and is in stride to goals and objectives of the business of Richman’s Investments. • The equipment and services belong to Richman’s Investments and there reserve the right to monitor any or all internet traffic including emails and any data sent or received. • Using Richman’s Investment hardware, software and or internet to hack into unauthorized websites is strictly prohibited. • The use of any and all bit torrent software or sites is not allowed on any network, owned or operated by Richman’s Investment do to its high risk of abuse and or misuse. • No viewing or distributing of inappropriate material on the internet owned or operated by Richman’s Investments and will result in termination of employment. • Any and all downloads done off of the internet must be scanned before opening or accessing (NO ACCECPTIONS). • Using Richman’s Investments hardware, software and or internet to form and sort of fraud, and/or software, film or......

Words: 323 - Pages: 2

Nt2580 Week 5 Essay 2

...Adhering to a standard in business does a lot of things for your company. First, it allows you to advertise that you reach and maintain such standards. This shows potential and currant customers that you use and adhere to this set of policies and standards and that your activities as a business comply with these set of guidelines. In the cse of E-commerce it would show your customers that you are reliable and safe to deal with when it comes to their financial matters. It shows customers that you hold security of their personal details whether financial or otherwise to a certain height in your business. The PCI DSS website says that compliance with its standards with data security: “…can bring major benefits to businesses of all sizes, while failure to comply can have serious and long-term negative consequences. Here are some reasons why.” * Compliance with the PCI DSS means that your systems are secure, and customers can trust you with their sensitive payment card information: * Trust means your customers have confidence in doing business with you * Confident customers are more likely to be repeat customers, and to recommend you to others * Compliance improves your reputation with acquirers and payment brands -- the partners you need in order to do business * Compliance is an ongoing process, not a one-time event. It helps prevent security breaches and theft of payment card data, not just today, but in the future: * As data compromise...

Words: 673 - Pages: 3

Mis589 Week 5 Essay

...Silvio Kennedy MIS589 Week 5 Homework June 4, 2014 R17. What is the difference between a permanent address and a care-of address? Who assigns a care-of address? In mobile network a permanent address for a mobile node is its IP address when it is at its home network. A care-of-address is the one its gets when it is visiting a foreign network In the Mobile Internet Protocol (Mobile IP), a home address is the relatively permanent IP address given to a mobile node. The home address remains unchanged no matter where the mobile node is located. The Internet Engineering Task Force (IETF) defines the home address in RFC 2002, IP Mobility Support, which describes an enhancement to the Internet Protocol (IP) that makes it easier to replug a mobile device into networks other than its home network. Care-of-Address, on the other hand is, is a temporary IP address for a mobile node (mobile device) that enables message delivery when the device is connecting from somewhere other than its home network. The care-of address identifies a mobile node's current point of attachment to the Internet and makes it possible to connect from a different location without changing the device's home address (permanent IP address). The Foreign Agent that on the visiting or foreign network assigns the Care-Of-Address to the mobile node. R1. What are the differences between message confidentiality and message integrity? Can you have confidentiality without integrity...

Words: 538 - Pages: 3

Nt2580: Introduction to Information Security Week 2 Essay

...Week 2 Essay Johnathan Terrance NT2580: Introduction to Information Security Brian Alley May 10, 2014 I have been given the task of designing a remote access control policy for establishing secure access between remote offices across several different states. Establishing this policy will protect the company and employees against attacks that may cost them tons of money and even their jobs. The policy will define several different security practices that employees need to adhere to in order to keep the network safe. These policies will be dictated through an AUP and signed by all employees with access to the network. The employees will also have to go through initial information security training before gaining access to the network. This training will also be required annually in order to maintain their access to the network. The AUP will dictate the requirements for passwords. The requirements will include an eight character alphanumeric password, two uppercase letters, two lowercase letters, two special characters, and two numbers. This will make it more difficult for the password to be breached. The AUP will also state that the company systems will only be used for work related purposes. All social networking sites and many other miscellaneous sites will be blocked. The user will also have to consent to monitoring when signing the AUP. Users will only be given access to files they need through the use of an ACL. This way if a password is breached the hacker...

Words: 617 - Pages: 3

Nt2580 Week 2 Forum

...Research the following questions and then discuss the questions with your classmates on the forum: * What is the purpose of security policies, and why do organizations need clear and concise policies for the proper use of employer-owned equipment and services? * What is the importance of an effective acceptable use policy (AUP) for a user and an employer? Be sure to include examples from your research to substantiate your responses. Participation Requirements: Discussion forums improve the online learning process by allowing students to engage in meaningful discourse. You can increase your participation grade by following these guidelines: * You should post your responses to the above questions and then respond to a minimum of two of your classmates' posts. Take a position on each question and justify your opinion on the basis of the textbook, the lesson, documents found in the ITT Tech Virtual Library, and your personal or professional experience. The quality of your submissions is a critical element in the evaluation process. Your submissions should not be of the type that state "I agree" or "Good post" as these responses neither have substance nor give any new information for a productive discussion. * If possible, share your own subject-related job experience. Remember, the goal is to learn from the experience of others. * Post your initial reply earlier in the week to maximize the opportunity for thoughtful exchanges between you and your...

Words: 534 - Pages: 3

Nt1330: Week 5 Essay

...Samuele Padalino Week 5 Essay Backing up Active Directory If you lose your Active Directory, you lose everything. Your Windows domain will stop working shortly after losing the Active Directory. The only way to prevent losing your Active Directory and Windows domain is by backing up the Active Directory. Every domain controller has a full copy of the directory and the ability to modify it. To ensure the safety of your active directory, you need to back up any one of the domain controllers. But if you want to be able to restore any domain controller, you’ll have to back them all up. To back up the Active Directory means to capture the System State, this is a collection of system-specific data that includes the Active Directory database and related log and transaction files, Registry, COM+ configuration information, boot files, the SYSVOL system volume, certificate information, and a few other system files. There is a free utility tool provided by Microsoft in Windows 2008. The backup tools will be able to capture a System State. But you have to keep the backup software in a different location than the domain controller in order to easily restore it. To recover the Active Directory you can use the ntdsutil snapshot command to create snapshots of the Active Directory database. By scheduling a task to periodically create snapshots, you can obtain additional copies of the Active Directory database over time. You can use these copies to better identify when the forest-wide...

Words: 388 - Pages: 2

Pt2520 Week 5 Essay

...Austin Powell PT2520 Week 5 Essay 07/16/14 Security Plan Authentication- Will designate using SQL Server, which includes a two-step log-in process that drastically improves security. The initial log-in will grant the user access to the server, there will be an additional log-in required to access the database. Due to the nature of each user having different permissions granted, SQL Server is a better choice over Windows and will require each user to enter a username and password. Authorization-SQL Server will only grant permissions to which the user is specifically given. Each permission granted is distinct and specifically granted. Roles will be established based on the permissions that are to be granted. There will be a tenant, owner, and property manager role. Once established, then the permissions will be setup and access to the various areas of the database will be given. Roles Tenants- Access will be given to such information as their lease, rental agreement, payment history, as well as any maintenance requests requested. Tenants will be allowed to change or delete information such as payment information. Owners-Access will only be given to information that pertains to the owner. Owner will have permission to only view information about leases, rental agreements, tenants and maintenance requests. Property Managers-Access to all information will be given to users of this role. Property Managers will be able to not only view but insert...

Words: 448 - Pages: 2

Week 5 Essay

...  Week 4 Bus 210 SWOT Analysis The business plan I chose was regarding a local pub and eatery business plan titled “The Spunky Monkey Bar and Grill”. This business plan is very well thought out and provides much strength. The owner/proprietor has 20 years of executive management experience, budgeting experience, and has a lot of knowledge in the bar industry. The industry consultant is relied upon for industry expertise and offers insight regarding rules and regulations, and government programs. This person is qualified because they own multiple small businesses in the area. These are mainly consisting of local juice bars and espresso stands. The bar manager has a BS in business management, 5 years experience as a bar supervisor, and 4 years of hands on bar management experience. The co-owner offers college level public relations experience, 5 years of customer service experience, 4 years of restaurant services experience, and an extensive knowledge in business management. The business plan expresses a need for an experienced CPA and emphasizes that some of the current members need to obtain their food handlers permits along with local city business permits. Also necessary will be associate credentials, which will be a requirement among future upper-level employees. The business model is very well developed and researched. The plan provides breakdowns of what capital is needed to start-up, maintain the business, and provides an anticipated growth plan for the next...

Words: 792 - Pages: 4

Essay 2 Microtheme 5

...Genna Cahill English Composition 1001 Essay 2 Microtheme 5 After reading Rachel Adams’s chapter “Sideshow Cinema”, I have gained a new perspective on Tod Browning’s film Freaks. Adams suggests that there may be a fine line between monster and victim regarding the normal people, such as Cleopatra and Hercules, and the freaks, such as Hans and the conjoined Hilton twins. “After establishing Hans as a sympathetic character who suffers unwarranted abuse, the spectacle of Cleo’s body, mutilated at the hands of the freaks, leaves the viewer unsure about who is the victim and who aggressor,” Adams describes (77). Up until the point of Cleo’s revelation as the “chicken-woman”, the normal-looking people leave us to feel more sympathy for the freaks based on the treatment of them. Majority of the film, we see Cleo, Hercules, and their normal friends treat the freaks as inferiors, teasing them subtly to their faces and more so behind their backs. Therefore, in this sense, the normal people can be seen as monsters and the freaks as victims. The effect of the camera also gives us more sympathy for the freaks. The settings in which these people are placed affect the way we see them. For example, Hans is often placed next to larger objects, especially in Cleo’s wagon, and this makes him, in proportion, look much, much smaller than he actually is. This is true when we are looking at Cleopatra from his point of view as well. Compared to Hans, she seems a lot taller, and we can...

Words: 527 - Pages: 3

Unit 5 Nt2580

...Tyler Hopkins 10/14/15 Unit 5 testing and monitoring security controls The Two popular types of security events that might indicate suspicious activity are Authentication Failures, and Unauthorized Access Attempts. Most times you will get this when you have failure due to device denying connection or incorrect password being entered in. Some system administrators set up alerts to let them know when there is an unauthorized access attempt, so that they may investigate the reason. These alerts can help stop hackers from gaining access to a secure or confidential system. Many secure systems may also lock an account that has had too many failed login attempts. When it comes to baseline anomalies that might indicate suspicious activity Network Abuse and Employees are downloading unauthorized material. That is why there are many policies out there to monitor the network abuse and employee abuse of unauthorized material. -Predictable passwords meet minimum length requirements but remain easily guessable. The solution to this problem is simple. You set a guideline for passwords for your employees to make it contain a set number of characters and numbers. And the passwords have to be changed every 30 days. -Sensitive laptop data is unencrypted and susceptible to physical theft. The solution to this problem is to encrypt all files and drives and sensitive info to make sure if it falls into the wrong hands they will not be able to destroy it. -A user made unauthorized use of......

Words: 264 - Pages: 2

Nt2580 Week 5 Essay 1

...Crystal Smith 8/30/2015 NT2580-Week 5 Essay Public and Private Sectors Agree: Strong Manufacturing Is Key to U.S. Innovation and a Competitive Future Federal Government Seeks Input on Cross-Sector Initiatives to Bolster Manufacturing New York, May 15, 2012 U.S. scientists, industry leaders, and public officials joined on May 8, 2012, for a discussion on how to nurture talent and fuel new scientific breakthroughs for America to have options that are more competitive. Among the speakers and participants were experts in research and development, renewable energy, smart grid, and advanced manufacturing, representing a number of member organizations of the American National Standards Institute (ANSI) from both the public and private sectors. The very important message was that our ability to innovate and build a stronger U.S. economy is very dependent on our manufacturing capability. The Advanced Manufacturing National Program Office, an interagency effort based at NIST, has released a request for information (RFI) seeking ideas, recommendations, and other public input on the design, governance, and other aspects of public-private partnership, the National Network for Manufacturing Innovation (NNMI). The NNMI will be the foundation of a U.S. innovation infrastructure of up to 15 linked regional hubs of manufacturing excellence, called Institutes of Manufacturing Innovation (IMIs). The IMIs would join industry, universities, community colleges, federal agencies...

Words: 417 - Pages: 2

Comp 2 Week 5

... are things that I would have hopefully had corrected with my first revision. There were a few notes of feedback that included replacing pronoun with specific words, to help the reader understand better and I thought that made sense. I was a little confused when I reread the paper with that thought running in my mind. There was also a feedback note that pointed out there was an error with APA citation and I would defiantly addressed that error or taken that part out so I wouldn’t be in trouble for plagiarism because that has serious consequences. I also agree with the last final note that the conclusion needs to be more. It needs to bring the paper to end with a final conclusion and the one that is in that spot now is weak and lacks any real point. It also doesn’t help summarize the essay in any way. I think to prevent plagiarism; I would make my own notes and use my own words and phrases so I would be safe from plagiarism from the very beginning of the writing process. I can honestly say that I would walk away and give myself a break so I wouldn’t be in such a rush to get it done and just copy original thoughts from someone else. Coming back to it with a refreshed mind and attitude can help with thinking of new ideas in a different mindset. I’d keep making a list of different ideas that might have the same basic point but I would try to keep the author’s exact words far away from my mind as possible. I am one that when it comes to citation I am uncomfortable with......

Words: 678 - Pages: 3