Telephone Sales

Question 1

Sunshine healthcare Corporation runs a small but rapidly growing medical equipment catalog sales business. It outsourced its Web operations to a local ISP for several years but as sales over the Web have become a larger portion of its business, it has decided to move its Web site onto its own internal computer systems. It has also decided to undertake a major upgrade of its own internal networks. The company has two buildings, an office complex, and a warehouse. The two-story office building has 60 computers. The first floor has 40 computers, 30 of which are devoted to telephone sales. The warehouse, located 400 feet across the company’s parking lot from the office building, has about 100,000 square feet, all on one floor. The warehouse has 15 computers in the shipping department located at one end of the warehouse. The company is about to experiment with using wireless handheld computers to help employees more quickly locate and pick products for customer orders. Based on traffic projections for the coming year, the company plans to use a T1 connection from its office to its ISP. It has three servers: the main Web server, an email server, and an internal application server for its application systems (e.g., orders, payroll).

Assignment: Conduct a brief risk assessment and develop a brief security policy. Include a discussion of the importance of network security in this environment; controls to reduce risk; what controls you would implement to controls unauthorized access; and recommendations for individual computer station security measures.

Length: 3-5 pages not including references or title page. Support your ideas with a minimum of three references.

Your paper should demonstrate thoughtful consideration of the ideas and concepts that are presented in the course and provide new thoughts and insights relating directly to this topic. Your paper should reflect scholarly writing and current APA standards. 

Question 2

2-3 page paper on cryptography with minimum 3 scholarly articles as reference in standard APA format.

paper should cover objectives such as formulating security-relevant decisions based on managing risks & basic understanding of the network, hardware, software, and communication vulnerabilities

Do you need help with this assignment? Or a different one? We got you covered.

Quality Guaranteed

Any Deadline

No Plagiarism