Usetutoringspotscode to get 8% OFF on your first order!

  • time icon24/7 online - support@tutoringspots.com
  • phone icon1-316-444-1378 or 44-141-628-6690
  • login iconLogin

Network Security

Instructions:

Technology Plan / Report 10% (10 points)

The student must write a security plan for his or her network and assess incident response, support, intrusion detection, Spyware, and physical security. The report is 10 pages double spaced and needs to include the necessary criteria as described by the text.

ABSTRACT – (High Level Description)

The student must write a security plan for his or her network and assess incident response, support, intrusion detection, Spyware, and physical security. The report is at least 10 pages, double spaced and needs to include the necessary criteria as described by the text below.

Cover – 1 Page – .5 points —— Total of Paper = 10 points

Elements Needed:

Title of work, your name, class name, the date, my name

References (at the end of the paper) – 1 point

You need at least 3, two can be websites and you need to refer to 3 of them in the plan

Table of Contents and Table of Figures – 1 page – 1 points

There needs to be an index in front of the cover that shows the layout of the document and the page number.

Incident Response – 2 pages – 3 points

What kind of problems do you define as an incident? Software problem, hardware problem, breach of security (intrusion, credit card number stolen, denial of service to your email?), How do you prioritize incidents?

Support – 1 point

You need help learning how to do an important task with your computer quickly for school, work, or to help a family member? Who do you call?

Vulnerability Assessment – .5 points

Leak Test, Penetration Test – www.grc.com what did you do to assess potential leaks and intrusions? What did you learn? What will you do?

Physical Security / Computer Access- 1 point

How are you addressing unauthorized people from accessing your computer, Internet, and account?

Spyware – How are you addressing Spyware problems – 1 point?

Incident Response Policy / Team – 1 point

Who is part of your incident response team and how do you decide if there is a problem?

You can leave a response, or trackback from your own site.

Leave a Reply

“Network Security”

“Network Security”

Please respond to the following:
• From the first e-Activity (research one (1) enterprise software or hardware firewall that is currently available on the market. https://www4.symantec.com/mktginfo/whitepaper/SecuringtheCloudfortheEnterprise0511_cta51258.pdf), discuss your rationale for choosing the specific firewall in question, and determine the primary way in which a company could incorporate it into an enterprise network in order to enhance security. Select the two (2) most important and / or unique features of the chosen firewall, and explain the primary reasons why those features make the firewall a viable option in enterprises today. Justify your answer.

From the second e-Activity, Read the article(https://www4.symantec.com/mktginfo/whitepaper/SecuringtheCloudfortheEnterprise0511_cta51258.pdf) discuss what you believe to be the two (2) most important security considerations related to cloud deployments, and explain the main reasons why you believe such considerations to be the most important.

Responses are currently closed, but you can trackback from your own site.

Comments are closed.

“Network Security”

“Network Security”

Please respond to the following:
• From the first e-Activity (research one (1) enterprise software or hardware firewall that is currently available on the market. https://www4.symantec.com/mktginfo/whitepaper/SecuringtheCloudfortheEnterprise0511_cta51258.pdf), discuss your rationale for choosing the specific firewall in question, and determine the primary way in which a company could incorporate it into an enterprise network in order to enhance security. Select the two (2) most important and / or unique features of the chosen firewall, and explain the primary reasons why those features make the firewall a viable option in enterprises today. Justify your answer.

From the second e-Activity, Read the article(https://www4.symantec.com/mktginfo/whitepaper/SecuringtheCloudfortheEnterprise0511_cta51258.pdf) discuss what you believe to be the two (2) most important security considerations related to cloud deployments, and explain the main reasons why you believe such considerations to be the most important.

Responses are currently closed, but you can trackback from your own site.

Comments are closed.

Powered by WordPress | Designed by: Premium WordPress Themes | Thanks to Themes Gallery, Bromoney and Wordpress Themes