Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Q1-Explain how clear desk and clear screen policy is important to protect the co

ID: 3683506 • Letter: Q

Question

Q1-Explain how clear desk and clear screen policy is important to protect the confidentiality of company-owned data.

Q2-What is the difference between Data Replication and Data Backup? Where Backed-up or replicated data should be stored?

Q3-What is the advantages and disadvantages of default deny model and default allow model? Cite at least 3 properties of each model.

Q4-Firewall rule sets use source IP addresses, destination addresses, ports, and protocols.

1. Describe the function of each.

2. What is the purpose of the following rule?

Allow Src=10.1.23.54 dest=85.75.32.200 Proto=tcp 21

3. What is the purpose of the following rule?

Deny Src=ANY dest=ANY Proto=tcp 23

NOTE: please no plagiarism

Explanation / Answer

1A) CLEAN DESK POLICY AND ITS IMPORTANCE :

The Benefits of a Clean Desk Policy :

Make Good Impressions

Discourages Prying Eyes

Reduce Stress

CLEAR SCREEN POLICY AND ITS IMPORTANCE:

A clear screen policy directs all your organization’s employees to lock their computers when leaving their desk and to log off when leaving for an extended period of time.

This ensures that the contents of the computer screen are protected from prying eyes and the computer is protected from unauthorized use.

With the popularity of open plan offices and sharing computer workstations, there is a greater need to safeguard your organization’s information.

In addition, a clear screen policy should be adopted because of the numerous benefits it can provide your organization. Here’s three.

Prevent Unauthorized Access

ISO 27001/17799 Compliance

2) Data Replication :

Data replication
Data replication is the straightforward copying of business information. IT professionals can think of replication as the process that would occur if all files on one drive or server were transferred to another. It backs up what users have at the moment. Such functionality means that data is backed up in the most literal sense: it can be recovered exactly as it was when stored.

A key component of a data replication strategy is to define recovery time objectives (RTO) and recovery point objectives (RPO); that is, how long can you be without critical workloads and how much data loss can the business reasonably absorb? The less flexible the RTO/RPO requirements are, the more complex and costly the solution will be.

DATA BACKUP :

Data backup up is just that, making a copy of your data files by taking periodic snapshots. It could be hours between snapshots, or days, depending on business objectives. The traditional backup is often to physical tape (the least expensive storage medium but also the least flexible in terms of retrieving information) or to a virtual tape library (VTL) and kept offsite. Retrieving the media and then pulling the information off is a time-consuming task, and falls far short of meaningful DR requirements.

The use case for data backup is to have a copy or copies of everything from the least important information to the most critical for the purpose of compliance and/or pinpoint data recovery of, let’s say, an employee’s emails for e-discovery, or a single transaction from five years ago or a deleted file from yesterday.

Storing copies of backup tapes off-site is essential to recovering your systems in the case of a natural disaster. In your off-site storage location, you should also include copies of the software you may need to install to reestablish operational systems.

3)

There are two basic strategies for defining firewall policy:

Default allow

With this strategy, you give the firewall the set of conditions that will result in data being blocked. Any host or protocol that is not covered by your policy will be passed by default.

Default deny

-->With this strategy, you describe the specific protocols that should be allowed to cross through the firewall, and the specific hosts that may pass data and be contacted. The rest are denied.

-->There are advantages and disadvantages to both default allow and default deny. The primary advantage of default allow is that it is easier to configure: you simply block out the protocols that are "too dangerous," and rely on your awareness to block new dangerous protocols as they are developed (or discovered). With default deny, you simply enable protocols as they are requested by your users or management. Any protocol that isn't being used by your organization might as well be blocked.