As you begin to perform the information systems audit for PVSS, assume the identity of a different person in the scenario. For this Discussion Board, you are now the Network Systems Manager for PVSS....

1 answer below »

As you begin to perform the information systems audit for PVSS, assume the identity of a different person in the scenario. For this Discussion Board, you are now the Network Systems Manager for PVSS.


As the Network Systems Manager, how would you create the followingfour controls (or policies) to be used by PVSS:



  • Entity level control

  • Network level control

  • Operating system level control

  • Web or database server level control


Keep in mind that each control should focus on a specific topic and offer the following structure:




  • The Policy Statement:This is a statement definingthe specific action or regulation.


  • Responsibilities:Who is responsible for various actions?


  • Enforcement:How the policy will be validated?


  • Violations:What are the consequences for violation?

Answered Same DayJan 06, 2021

Answer To: As you begin to perform the information systems audit for PVSS, assume the identity of a different...

Deepti answered on Jan 06 2021
140 Votes
Entry Level Control Policy
System Access Control List shall be applied to each file, folder or regi
stry key on file share to safeguard the system from undetected access. The account logon policy configuration will help the network manager to authenticate account data on domain controller as well as on security account manager. It will include audit credential validation, authentication service and audit account logon events. This policy will monitor changes to user and computer accounts and groups also. Sensitive data sould be ensured to be stored separately. Entry level control policy shall be enforced through wired connections
Operating System Level Control Policy
The Policy Statement: Access Control Policy will include user and network access controls, workstation security standards, network access monitoring, password change policy and access control...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here