SlideShare a Scribd company logo
1 of 3
Network Security Strategy – ATTN Computer Science
Assignment is due by Thursday January 29 at midnight or 8AM
Friday Morning at the latest.
NO PLAGERISM !!!!
Will pay $40 dollars.
As Director of Information Security, you will conduct research
into security mechanisms (hardware and software) that can
expand and/or enhance your current security infrastructure.
1)
Solution
(s) should help protect against DoS (denial of service) attacks.
2) Be sure to look at Intrusion Detection/Prevention Systems.
3) Look at mobile computing solutions as well.
4) Focus on a defense-in-depth (layered) approach.
Develop a strategy no more than 4-5 pages in length). The
strategy should outline the various security controls that will be
implemented and explain how each will be used to mitigate the
internal/external security risks to your organization. Justify
your choices and submit to the CIO for approval.
Stakeholders are the Director of Information Security, 8
representatives from remote sites, IT Operations manager,
Resource Manager, and your vendor for equipment and
software.
Criteria – Demonstrate a grasp of the problem and
understanding of the key concepts - utilize diagrams and
graphics as needed.
Analysis – Apply Research and practical experiences of security
mechanisms
Conclusions and Recommendations – Close with strong
conclusions that support your research
Suggested Resources –
Ramachandran.
Designing Security Architecture

More Related Content

Similar to Network Security Strategy – ATTN  Computer ScienceAssignment is .docx

· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
oswald1horne84988
 
In this assignment we will take a look at a given project scen.docx
In this assignment we will take a look at a given project scen.docxIn this assignment we will take a look at a given project scen.docx
In this assignment we will take a look at a given project scen.docx
jaggernaoma
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
bartholomeocoombs
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
annette228280
 
1. Written assignmentscommunication must demonstrate professional.docx
1. Written assignmentscommunication must demonstrate professional.docx1. Written assignmentscommunication must demonstrate professional.docx
1. Written assignmentscommunication must demonstrate professional.docx
paynetawnya
 
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAEIT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
360 BSI
 
Organizations rely heavily on the use of information technology .docx
Organizations rely heavily on the use of information technology .docxOrganizations rely heavily on the use of information technology .docx
Organizations rely heavily on the use of information technology .docx
aman341480
 
Task 3 says to A.  Create a multimedia presentation (e.g., PowerP.docx
Task 3 says to A.  Create a multimedia presentation (e.g., PowerP.docxTask 3 says to A.  Create a multimedia presentation (e.g., PowerP.docx
Task 3 says to A.  Create a multimedia presentation (e.g., PowerP.docx
SANSKAR20
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
360 BSI
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
360 BSI
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
360 BSI
 
Specialist Security Engineer
Specialist Security EngineerSpecialist Security Engineer
Specialist Security Engineer
Mark Long
 
Select and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection SolutionSelect and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection Solution
Info-Tech Research Group
 

Similar to Network Security Strategy – ATTN  Computer ScienceAssignment is .docx (20)

· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
 
In this assignment we will take a look at a given project scen.docx
In this assignment we will take a look at a given project scen.docxIn this assignment we will take a look at a given project scen.docx
In this assignment we will take a look at a given project scen.docx
 
Ise viii-information and network security [10 is835]-solution
Ise viii-information and network  security [10 is835]-solutionIse viii-information and network  security [10 is835]-solution
Ise viii-information and network security [10 is835]-solution
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
 
1. Written assignmentscommunication must demonstrate professional.docx
1. Written assignmentscommunication must demonstrate professional.docx1. Written assignmentscommunication must demonstrate professional.docx
1. Written assignmentscommunication must demonstrate professional.docx
 
Proactive Approach to OT incident response - HOUSECCON 2023
Proactive Approach to OT incident response - HOUSECCON 2023Proactive Approach to OT incident response - HOUSECCON 2023
Proactive Approach to OT incident response - HOUSECCON 2023
 
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAEIT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
 
Computer security
Computer securityComputer security
Computer security
 
Organizations rely heavily on the use of information technology .docx
Organizations rely heavily on the use of information technology .docxOrganizations rely heavily on the use of information technology .docx
Organizations rely heavily on the use of information technology .docx
 
Task 3 says to A.  Create a multimedia presentation (e.g., PowerP.docx
Task 3 says to A.  Create a multimedia presentation (e.g., PowerP.docxTask 3 says to A.  Create a multimedia presentation (e.g., PowerP.docx
Task 3 says to A.  Create a multimedia presentation (e.g., PowerP.docx
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
 
GSA calls out Cyber Hunt skills in final Cybersecurity Contract Orals
GSA calls out Cyber Hunt skills in final Cybersecurity Contract OralsGSA calls out Cyber Hunt skills in final Cybersecurity Contract Orals
GSA calls out Cyber Hunt skills in final Cybersecurity Contract Orals
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
 
OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience Fastrak
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
 
Specialist Security Engineer
Specialist Security EngineerSpecialist Security Engineer
Specialist Security Engineer
 
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCESCOMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
 
Select and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection SolutionSelect and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection Solution
 

More from darwinming1

Note I need 2 pages paper addressing the provided details. Please.docx
Note I need 2 pages paper addressing the provided details. Please.docxNote I need 2 pages paper addressing the provided details. Please.docx
Note I need 2 pages paper addressing the provided details. Please.docx
darwinming1
 
North, South and West Please respond to the following (Note Pl.docx
North, South and West Please respond to the following (Note Pl.docxNorth, South and West Please respond to the following (Note Pl.docx
North, South and West Please respond to the following (Note Pl.docx
darwinming1
 
Not only are people born into a specific culture, they also are soci.docx
Not only are people born into a specific culture, they also are soci.docxNot only are people born into a specific culture, they also are soci.docx
Not only are people born into a specific culture, they also are soci.docx
darwinming1
 
Note Be sure to review the examples and hints provided with e.docx
Note Be sure to review the examples and hints provided with e.docxNote Be sure to review the examples and hints provided with e.docx
Note Be sure to review the examples and hints provided with e.docx
darwinming1
 
NOTE A Power point presentation is also required along side this.docx
NOTE A Power point presentation is also required along side this.docxNOTE A Power point presentation is also required along side this.docx
NOTE A Power point presentation is also required along side this.docx
darwinming1
 
New Opportunities in Community SettingsCommunity based nursing h.docx
New Opportunities in Community SettingsCommunity based nursing h.docxNew Opportunities in Community SettingsCommunity based nursing h.docx
New Opportunities in Community SettingsCommunity based nursing h.docx
darwinming1
 
Nine-year-old Wandas teacher notices that for the past few weeks, W.docx
Nine-year-old Wandas teacher notices that for the past few weeks, W.docxNine-year-old Wandas teacher notices that for the past few weeks, W.docx
Nine-year-old Wandas teacher notices that for the past few weeks, W.docx
darwinming1
 

More from darwinming1 (20)

Not all countries have moved through all 4 phases of the demographic.docx
Not all countries have moved through all 4 phases of the demographic.docxNot all countries have moved through all 4 phases of the demographic.docx
Not all countries have moved through all 4 phases of the demographic.docx
 
NOTE I need just 150-200 words answer with 1-2 references in APA. M.docx
NOTE I need just 150-200 words answer with 1-2 references in APA. M.docxNOTE I need just 150-200 words answer with 1-2 references in APA. M.docx
NOTE I need just 150-200 words answer with 1-2 references in APA. M.docx
 
Note I need 2 pages paper addressing the provided details. Please.docx
Note I need 2 pages paper addressing the provided details. Please.docxNote I need 2 pages paper addressing the provided details. Please.docx
Note I need 2 pages paper addressing the provided details. Please.docx
 
Not-for-profit organizations are using social media to redefine how .docx
Not-for-profit organizations are using social media to redefine how .docxNot-for-profit organizations are using social media to redefine how .docx
Not-for-profit organizations are using social media to redefine how .docx
 
North, South and West Please respond to the following (Note Pl.docx
North, South and West Please respond to the following (Note Pl.docxNorth, South and West Please respond to the following (Note Pl.docx
North, South and West Please respond to the following (Note Pl.docx
 
North, South and West Please respond to the following (Note Plea.docx
North, South and West Please respond to the following (Note Plea.docxNorth, South and West Please respond to the following (Note Plea.docx
North, South and West Please respond to the following (Note Plea.docx
 
No unread replies.88 replies.Go to httpwww.eagles.orgvu-.docx
No unread replies.88 replies.Go to httpwww.eagles.orgvu-.docxNo unread replies.88 replies.Go to httpwww.eagles.orgvu-.docx
No unread replies.88 replies.Go to httpwww.eagles.orgvu-.docx
 
Not only are people born into a specific culture, they also are soci.docx
Not only are people born into a specific culture, they also are soci.docxNot only are people born into a specific culture, they also are soci.docx
Not only are people born into a specific culture, they also are soci.docx
 
NOTE I am very particular about my papers. Please do not respond if.docx
NOTE I am very particular about my papers. Please do not respond if.docxNOTE I am very particular about my papers. Please do not respond if.docx
NOTE I am very particular about my papers. Please do not respond if.docx
 
Note Be sure to review the examples and hints provided with e.docx
Note Be sure to review the examples and hints provided with e.docxNote Be sure to review the examples and hints provided with e.docx
Note Be sure to review the examples and hints provided with e.docx
 
NOTE A Power point presentation is also required along side this.docx
NOTE A Power point presentation is also required along side this.docxNOTE A Power point presentation is also required along side this.docx
NOTE A Power point presentation is also required along side this.docx
 
No plagiarismBetween 10 and 15 relevant academic journals with H.docx
No plagiarismBetween 10 and 15 relevant academic journals with H.docxNo plagiarismBetween 10 and 15 relevant academic journals with H.docx
No plagiarismBetween 10 and 15 relevant academic journals with H.docx
 
No plagirism , please I need this on time due 41715 no work cited .docx
No plagirism , please I need this on time due 41715 no work cited .docxNo plagirism , please I need this on time due 41715 no work cited .docx
No plagirism , please I need this on time due 41715 no work cited .docx
 
no need outside source expect for Durkheims on suicideFor the t.docx
no need outside source expect for Durkheims on suicideFor the t.docxno need outside source expect for Durkheims on suicideFor the t.docx
no need outside source expect for Durkheims on suicideFor the t.docx
 
No matter where I worked or what job I held, it was my interpersona.docx
No matter where I worked or what job I held, it was my interpersona.docxNo matter where I worked or what job I held, it was my interpersona.docx
No matter where I worked or what job I held, it was my interpersona.docx
 
no more than 1,250 words. A strategic plan for ESPN, including the f.docx
no more than 1,250 words. A strategic plan for ESPN, including the f.docxno more than 1,250 words. A strategic plan for ESPN, including the f.docx
no more than 1,250 words. A strategic plan for ESPN, including the f.docx
 
No other country in the world has a health care system like that of .docx
No other country in the world has a health care system like that of .docxNo other country in the world has a health care system like that of .docx
No other country in the world has a health care system like that of .docx
 
NO PLAGARISM IF YOU CANNOT DO ORIGINAL AND GOOD QUALITY WORK, THE.docx
NO PLAGARISM IF YOU CANNOT DO ORIGINAL AND GOOD QUALITY WORK, THE.docxNO PLAGARISM IF YOU CANNOT DO ORIGINAL AND GOOD QUALITY WORK, THE.docx
NO PLAGARISM IF YOU CANNOT DO ORIGINAL AND GOOD QUALITY WORK, THE.docx
 
New Opportunities in Community SettingsCommunity based nursing h.docx
New Opportunities in Community SettingsCommunity based nursing h.docxNew Opportunities in Community SettingsCommunity based nursing h.docx
New Opportunities in Community SettingsCommunity based nursing h.docx
 
Nine-year-old Wandas teacher notices that for the past few weeks, W.docx
Nine-year-old Wandas teacher notices that for the past few weeks, W.docxNine-year-old Wandas teacher notices that for the past few weeks, W.docx
Nine-year-old Wandas teacher notices that for the past few weeks, W.docx
 

Recently uploaded

會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
EADTU
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
cupulin
 

Recently uploaded (20)

Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver &  Gallbladder (Anatomy & Physiology).pptxThe Liver &  Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptx
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfRich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 

Network Security Strategy – ATTN  Computer ScienceAssignment is .docx

  • 1. Network Security Strategy – ATTN Computer Science Assignment is due by Thursday January 29 at midnight or 8AM Friday Morning at the latest. NO PLAGERISM !!!! Will pay $40 dollars. As Director of Information Security, you will conduct research into security mechanisms (hardware and software) that can expand and/or enhance your current security infrastructure. 1) Solution (s) should help protect against DoS (denial of service) attacks. 2) Be sure to look at Intrusion Detection/Prevention Systems. 3) Look at mobile computing solutions as well.
  • 2. 4) Focus on a defense-in-depth (layered) approach. Develop a strategy no more than 4-5 pages in length). The strategy should outline the various security controls that will be implemented and explain how each will be used to mitigate the internal/external security risks to your organization. Justify your choices and submit to the CIO for approval. Stakeholders are the Director of Information Security, 8 representatives from remote sites, IT Operations manager, Resource Manager, and your vendor for equipment and software. Criteria – Demonstrate a grasp of the problem and understanding of the key concepts - utilize diagrams and graphics as needed. Analysis – Apply Research and practical experiences of security mechanisms Conclusions and Recommendations – Close with strong conclusions that support your research Suggested Resources –