Purchase Solution

Information Security Policy Building

Not what you're looking for?

Ask Custom Question

Create a security policy for the following company explaining network security, physical security and access control systems:

Sunica Music and Movies is a local multimedia chain with four locations. Each store has been acting independently of one another and has difficulty coordinating customer sales from one store to another based on inventory. As a result of poor communications, revenue and customer base have been lost due to jumbled inventory from store to store, decentralized accounting, and no Internet-based commerce. With the successful implementation of a WAN solution, all stores will have the ability to access a centralized database for inventory and dynamically reorder stock based on sales. Each location will tunnel all financial transactions through a central accounting package, eliminating bookkeeping errors and centralizing the company finances. All transactions and customer inventory browsing will be done through a web interface and custom Intranet Web site. To meet their need for an Internet customer base, web servers will be located in their data center and will tie in to the company's accounting and transaction servers to provide real-time sales and inventory information to customers.

(roughly 1000 words)

Purchase this Solution

Solution Summary

This solution discusses network security, physical security and access control system in 762 words.

Solution Preview

The three important aspects for creating the security policy of Sunica Music and Movies multimedia organization is as follows.

1. Network security,
2. Physical security,
3. Access control system.

Physical Security

The WAN that you are going to create to eradicate the problem of jumbled inventory and the decentralized database it must have one server and the rest are the clients. The one server will control the whole transaction and it should be compatible to other client machines. In the network security the thread should be used because this will let the client's machine to know the stock of the main server and in reply the main server will come to know about the sell of the clients. The transaction within the organization must be synchronized as to maintain the inventory not getting jumbled. In the decentralized database the database must not have the same permission on a particular resource at the same time. Then if two process wants to access the same resource in the WAN, then the latter one will have to wait to get the permission to access the resource.

Network Security

Authenticating the user is actually pretty straightforward once you've made ...

Solution provided by:
Education
  • BCom, SGTB Khalsa College, University of Delhi
  • MBA, Rochester Institute of Technology
Recent Feedback
  • "Thank you. "
  • "Thank you"
  • "Thank you. I got 20/20 last week for my discussion you help me out with."
  • "Thank you. Great Job. "
  • "Thank you. Great Job. "
Purchase this Solution


Free BrainMass Quizzes
Java loops

This quiz checks your knowledge of for and while loops in Java. For and while loops are essential building blocks for all Java programs. Having a solid understanding of these constructs is critical for success in programming Java.

Basic Networking Questions

This quiz consists of some basic networking questions.

C++ Operators

This quiz tests a student's knowledge about C++ operators.

Basic Computer Terms

We use many basic terms like bit, pixel in our usual conversations about computers. Are we aware of what these mean? This little quiz is an attempt towards discovering that.

Basic UNIX commands

Use this quiz to check your knowledge of a few common UNIX commands. The quiz covers some of the most essential UNIX commands and their basic usage. If you can pass this quiz then you are clearly on your way to becoming an effective UNIX command line user.