Description
Security Operations
Systems Management
Overview:
You are the Information Security Officer of Mahtmarg Manufacturing a small manufacturing company worth approximately $5 Million who provides fiber cable to local businesses, individual customers and to government organizations. In the course of the next eight weeks you will be creating your Information Security Plan (Issue-Specific Security Policy in Table 4-3 of the textbook) step by step using this scenario.
Your Task
Step 4: Develop the Systems Management section of your ISP
In this week’s Lab you will develop the section on Systems Management which focuses on the user’s relationship to systems management and the responsibilities delegated to both users and systems administrators to avoid confusion. This includes:
- Authentication and Encryption
- System Administrator Responsibilities
- User Responsibilities
- Auditing
- Configuration
Explanation & Answer
Hello there, here in attached in the final answer. Pleasure working with you
Running Head: SYSTEMS MANAGEMENT
Systems management
Student’s name:
Professor’s name:
Date:
SYSTEMS MANAGEMENT
Information security officer
The security officer in charge of information has the responsibility for the delivery and
development of the information security and the programs of privacy in the university. The
program scope is in all over the university and includes all the types of information from
electronic to print and all other formats that may be used.
Authentication and Encryption
This document will provide full information and helps in identifying tools which can be
used to do encryption of data using the methods sufficient for meeting the information
classification and handling standards of the university. When this is used in conjunction with all
the other requirements that are listed in the information technology secur...