Determine how the types and size of the organization impact


1. "Policy for Portable and Mobile Devices" Please respond to the following:

• Determine the primary considerations that an organization would need to take into account when developing the security policies involving bring your own device (BYOD), portable and mobile devices.

• List and examine the major challenges of enforcing policies concerning BYOD, portable and mobile devices.

2. Demilitarized Zone (DMZ) Control Standards" Please respond to the following:

• Analyze the IT infrastructure assets that are commonly located in the DMZ. Determine how the types and size of the organization impact the structure of the DMZ.

• Propose at least three policies that organizations need to implement for traffic flowing into the DMZ or out of the DMZ.

Reply to the other student answer below of the same questions above.

Analyze the IT infrastructure assets that are commonly located in the DMZ. Determine how the types and size of the organization impact the structure of the DMZ.

There are certain standards that require access control to the internet. The type and size of an organization impact the structure of the DMZ depending of the kind of access control is needed. "A Content Filtering standard is an example of a filtering policy.

It describes the control requirements for employee access to Web sites using employer-owned devices", (Johnson, page 244, 2011). Also, depending of the type of connectivity to the Internet, this can require changes to the policy and protocol filtering rules.

Propose at least three policies that organizations need to implement for traffic flowing into the DMZ or out of the DMZ.

External Information System Services Connect Standard is a policy that requires those who use LAN-to-WAN connectivity to establish a secure connection. Another policy needed to implement for traffic flowing into or out of the DMZ is the DMZ Control Standard.

It establishes the controls for publicly accessible devices to be placed in the specific architecture. The User Internet Proxy Standard establishes controls for an internet user proxy for all internet traffic coming in and out of the domain.

Johnson, R., Merkow, M. (2011). Security Policies and Implementation Issues.

Solution Preview :

Prepared by a verified Expert
Management Information Sys: Determine how the types and size of the organization impact
Reference No:- TGS02778021

Now Priced at $10 (50% Discount)

Recommended (99%)

Rated (4.3/5)