South University IT Security – Employees Computer Crimes Question

South University IT Security – Employees Computer Crimes Question

Security Report:

In this assignment, you will continue with the report for ABC, Inc. that you started in Week 1 Project and continued in Week 2 Project, Week 3 Project, and Week 4 Project. Remember to review the scenario document for the company profile and overall security objectives. Modify and correct the plan you created for Week 4 Project to accommodate suggestions and recommendations from your instructor and your own changes based on the readings and activities for this week. Use Track Changes or color code your changes and additions so that the changes are easy to identify.

In this week’s assignment, you will complete the final security report for ABC, Inc. by considering fault tolerance mechanisms and incorporating a policy and redress system for employees regarding computer crimes and computer use within the organization. Using the South University Online Library or the Internet, research about the following:

  • Mechanisms available for fault tolerance in a system
  • Computer crimes and legal implications for employees
  • Dispute resolution mechanisms when computer crimes occur

Using your project report from Week 4 Project, complete the following tasks by adding 3 to 5 pages to the existing report:

  • Create a section of the report that describes the computer crimes and legal implications for the employees. This should include a point of contact for disputes, the process of appeal, and levels of severity and consequence. This should just be an overview in general terms rather than a complete policy declaration.
  • Recommend a fault-tolerance mechanism or a combination of fault-tolerance mechanisms that needs to be implemented in the organization to ensure uninterrupted business. What elements of the business need to be continuous for the business to survive? Justify your answer.
  • Make sure all prior areas of security for ABC Inc. have been sufficiently addressed along with implementation and verification details. Be sure you have referenced external sources for up-to-date information and comprehensive recommendations. This can include library and Internet research.
  • Describe the implementation process and timeline for your recommendations. Try to give as reasonable a timeline as possible and explain your plan.

Expand the section of your report for verifying the implementation of the security recommendations for this week. Identify what is being tested for each verification activity. This should include testing activities to make sure the security system is working properly. An example of this would be using an intentionally incorrect password to make sure the system does not allow the login.