2023 Final Project Creation of a Security Policy Based on your consulting work over the last 15 weeks for Joe s Emporium you have earned enough confidence from Joe that he wishes to enlist your aid in creating a security policy for his company In order to accomplish this goal he has provided you with the following information Network Setup Manufacturing 20 Windows XP computers connected to a centralized Windows 2003 server containing plans for the various proprietary furniture designs created by Joe s Emporium Administration 5 Windows XP computers connected to the same centralized server as manufacturing containing various administrative financial human resource and strategic business files The central server also provides authentication services for all the computers | Assignment Collections

Computer Science 2023 Final Project Security Policy

2023 Final Project Creation of a Security Policy Based on your consulting work over the last 15 weeks for Joe s Emporium you have earned enough confidence from Joe that he wishes to enlist your aid in creating a security policy for his company In order to accomplish this goal he has provided you with the following information Network Setup Manufacturing 20 Windows XP computers connected to a centralized Windows 2003 server containing plans for the various proprietary furniture designs created by Joe s Emporium Administration 5 Windows XP computers connected to the same centralized server as manufacturing containing various administrative financial human resource and strategic business files The central server also provides authentication services for all the computers | Assignment Collections

Final Project: Creation of a Security Policy 
Based on your consulting work over the last 15 weeks for Joe’s Emporium, you have earned 
enough confidence from Joe that he wishes to enlist your aid in creating a security policy for his 
company. In order to accomplish this goal, he has provided you with the following information: 
Network Setup   
Manufacturing: 20 Windows XP computers connected to a centralized Windows 2003 server 
containing plans for the various proprietary furniture designs created by Joe’s Emporium. 
Administration: 5 Windows XP computers connected to the same centralized server as 
manufacturing, containing various administrative, financial, human resource, and strategic 
business files. The central server also provides authentication services for all the computers 
through use of Active Directory. 
Internet: A UNIX‐based server used to house the company website, e‐commerce applications, 
and email. The server is currently being “protected” by a software‐based firewall installed on 
the web server. Additionally, all Internet access from the internal computers is channeled 
through this server. 
Wireless: A wireless router has been installed to allow executive staff to use their laptops 
without having to physically connect to the network. The laptops are all running Vista. 
 
Organizational Structure 
Joe’s Emporium is a relatively flat organization, with the following groups: 
Executive: Comprised of Joe as the President, a COO, and VP’s of Marketing, Finance, and 
Human Resources. 
Administrative: This group is comprised of HR personnel and administrative staff for Joe and the 
VPs. 
Operations: This group is comprised of the shift managers that oversee manufacturing. There is 
also an IT person who oversees maintenance of the computer systems. 
Manufacturing: This group is comprised of the employees – including the previously 
incarcerated personnel Joe hires as part of the community reintegration program – who 
manufacture and ship the products created by the company. 
 

Physical Infrastructure 
Joe’s Emporium is located in one of Gotham’s secluded business parks, and is housed in a single 
building containing all operations. Primary access is through the front, with a door to the left 
leading to the administrative and executive offices, and a door to the right leading to the 
manufacturing floor. Both doors are normally unlocked, and the entrance door is locked at 
night when the administrative staff leaves for the day. There is a loading dock in the rear of the 
manufacturing floor, which is accessible 24/7, as Joe runs a continuous operation. Workers on 
the Evening and Midnight shifts access the building through the loading dock after the front 
door is locked. There is no video surveillance, and police protection is available through normal 
channels (e.g., 911). 
The network infrastructure is secured as follows: The centralized server is located in a server 
room located off the administrative offices, which is unlocked during the day because this is 
where the administrative printers and copier are located, as well as the IT person’s “workshop”.  
Joe, his administrative assistant, and the IT person have keys to the server room, which is 
supposed to be locked by the last person to leave the administrative offices for the day. Cables 
are routed through the overhead to the various workstations via cable drops in the walls. 
Administrative employees are encouraged to shut down their workstations when they leave for 
the day, but this is not strictly enforced. The manufacturing computers run 24/7 to support 
manufacturing activities. The manufacturing staff is required to log out/in during shift changes, 
but, again, this is not strictly enforced. 
 
The Project 
Because of the various discussions you have had with Joe over the last few weeks, he is 
beginning to suspect that he doesn’t have to most secure operation. Therefore, he wants you 
to do the following: 
1. Using the “Security Policy Roadmap – Process for Creating Security Policies” as a guide, 
he would like you to conduct a threat assessment in accordance with section 4 of the 
guide. For clarity, he would like to see the analysis summarized in a table, similar to that 
in section 4.3. This analysis should include both logical and physical threats to the IT 
infrastructure. 
2. Using the above analysis, he would like you to propose logical and physical controls, 
including possible infrastructure changes, to improve the security of the IT 
infrastructure. So that spending is appropriate, your recommendations should be 

justified and relevant to the needs of Joe’s business (i.e., don’t recommend Fort Knox‐
level security if you don’t think he needs it). 
3. He would like you to define access privileges for each of the organization’s groups, 
based on the provided information. Include in your definition the need for a dedicated 
security resource(s) and level (coordinator, director, VP), with justification. 
4. Finally, he would like you to draft a basic training plan for training the employees on 
basic security and the security policy. 
Joe would like to see your response returned in an 8‐12 page APA report, with coversheet and 
table of contents. Upload your report to the Final Project drop box when you are complete. 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

#write essay #research paper #blog writing #article writing #academic writer #reflective paper #essay pro #types of essays #write my essay #reflective essay #paper writer #essay writing service #essay writer free #essay helper #write my paper #assignment writer #write my essay for me #write an essay for me #uk essay #thesis writer #dissertation writing services #writing a research paper #academic essay #dissertation help #easy essay #do my essay #paper writing service #buy essay #essay writing help #essay service #dissertation writing #online essay writer #write my paper for me #types of essay writing #essay writing website #write my essay for free #reflective report #type my essay #thesis writing services #write paper for me #research paper writing service #essay paper #professional essay writers #write my essay online #essay help online #write my research paper #dissertation writing help #websites that write papers for you for free #write my essay for me cheap #pay someone to write my paper #pay someone to write my research paper #Essaywriting #Academicwriting #Assignmenthelp #Nursingassignment #Nursinghomework #Psychologyassignment #Physicsassignment #Philosophyassignment #Religionassignment #History #Writing #writingtips #Students #universityassignment #onlinewriting #savvyessaywriters #onlineprowriters #assignmentcollection #excelsiorwriters #writinghub #study #exclusivewritings #myassignmentgeek #expertwriters #art #transcription #grammer #college #highschool #StudentsHelpingStudents #studentshirt #StudentShoe #StudentShoes #studentshoponline #studentshopping #studentshouse #StudentShoutout #studentshowcase2017 #StudentsHub #studentsieuczy #StudentsIn #studentsinberlin #studentsinbusiness #StudentsInDubai #studentsininternational