SlideShare a Scribd company logo
Network Security Strategy – ATTN Computer Science
Assignment is due by Thursday January 29 at midnight or 8AM
Friday Morning at the latest.
NO PLAGERISM !!!!
Will pay $40 dollars.
As Director of Information Security, you will conduct research
into security mechanisms (hardware and software) that can
expand and/or enhance your current security infrastructure.
1)
Solution
(s) should help protect against DoS (denial of service) attacks.
2) Be sure to look at Intrusion Detection/Prevention Systems.
3) Look at mobile computing solutions as well.
4) Focus on a defense-in-depth (layered) approach.
Develop a strategy no more than 4-5 pages in length). The
strategy should outline the various security controls that will be
implemented and explain how each will be used to mitigate the
internal/external security risks to your organization. Justify
your choices and submit to the CIO for approval.
Stakeholders are the Director of Information Security, 8
representatives from remote sites, IT Operations manager,
Resource Manager, and your vendor for equipment and
software.
Criteria – Demonstrate a grasp of the problem and
understanding of the key concepts - utilize diagrams and
graphics as needed.
Analysis – Apply Research and practical experiences of security
mechanisms
Conclusions and Recommendations – Close with strong
conclusions that support your research
Suggested Resources –
Ramachandran.
Designing Security Architecture

More Related Content

PPTX
Manage Network Security of HNS level-4 .pptx
PPT
afdgadfdgadfgadfdgafgadfgadfhdfSDFaashif12 (2).ppt
DOCX
aascfsdfasdaWFDASFDASFSFSDFASSSFashif12.docx
PDF
Network srcurity
DOCX
Imagine you are an Information Systems Security Officer for a me.docx
PDF
5 Essential Network Security Strategies to Defend Against Modern Cyberattacks...
PDF
Community IT Innovators - IT Security Best Practices
DOCX
Note Review the page requirements and formatting instructions for.docx
Manage Network Security of HNS level-4 .pptx
afdgadfdgadfgadfdgafgadfgadfhdfSDFaashif12 (2).ppt
aascfsdfasdaWFDASFDASFSFSDFASSSFashif12.docx
Network srcurity
Imagine you are an Information Systems Security Officer for a me.docx
5 Essential Network Security Strategies to Defend Against Modern Cyberattacks...
Community IT Innovators - IT Security Best Practices
Note Review the page requirements and formatting instructions for.docx

Similar to Network Security Strategy – ATTN  Computer ScienceAssignment is .docx (20)

PPTX
MS. Cybersecurity Reference Architecture
DOC
Strayer cis 333 week 10 technical project paper
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPTX
RSA Conference 2017 session: Hacker’s Perspective on Your Windows Infrastruct...
PDF
network security.pdf
PPTX
My presentation for cyber security and its importance.pptx
DOC
Strayer cis 333 week 10 technical project paper
DOC
Strayer cis 333 week 10 technical project paper
PPTX
APT & What we can do TODAY
DOCX
Imagine you are an Information Systems Security Officer for a medium.docx
DOCX
SafeAssign Originality ReportSummer 2019 - Security Architecture.docx
DOCX
Note Review the page requirements and formatting  instruction.docx
DOCX
CMGT 411 Entire Course NEW
DOC
Network Security Essentials for IT Professionals.doc
DOCX
Key Assignment DraftThis is Part 1 of the Key Assignment. Yo.docx
DOCX
Note Review the page requirements and formatting instructions for.docx
DOCX
ISOL 533 - Information Security and Risk Management R.docx
PDF
Youve been hired as a network and information security officer for a.pdf
PPTX
Nist 800 53 deep dive 20210813
PPTX
Sallysspecialservices networksecurityproposal2-100305141834-phpapp02
MS. Cybersecurity Reference Architecture
Strayer cis 333 week 10 technical project paper
Unit-1 introduction to cyber security discuss about how to secure a system
RSA Conference 2017 session: Hacker’s Perspective on Your Windows Infrastruct...
network security.pdf
My presentation for cyber security and its importance.pptx
Strayer cis 333 week 10 technical project paper
Strayer cis 333 week 10 technical project paper
APT & What we can do TODAY
Imagine you are an Information Systems Security Officer for a medium.docx
SafeAssign Originality ReportSummer 2019 - Security Architecture.docx
Note Review the page requirements and formatting  instruction.docx
CMGT 411 Entire Course NEW
Network Security Essentials for IT Professionals.doc
Key Assignment DraftThis is Part 1 of the Key Assignment. Yo.docx
Note Review the page requirements and formatting instructions for.docx
ISOL 533 - Information Security and Risk Management R.docx
Youve been hired as a network and information security officer for a.pdf
Nist 800 53 deep dive 20210813
Sallysspecialservices networksecurityproposal2-100305141834-phpapp02

More from darwinming1 (20)

DOCX
Not all countries have moved through all 4 phases of the demographic.docx
DOCX
NOTE I need just 150-200 words answer with 1-2 references in APA. M.docx
DOCX
Note I need 2 pages paper addressing the provided details. Please.docx
DOCX
Not-for-profit organizations are using social media to redefine how .docx
DOCX
North, South and West Please respond to the following (Note Pl.docx
DOCX
North, South and West Please respond to the following (Note Plea.docx
DOCX
No unread replies.88 replies.Go to httpwww.eagles.orgvu-.docx
DOCX
Not only are people born into a specific culture, they also are soci.docx
DOCX
NOTE I am very particular about my papers. Please do not respond if.docx
DOCX
Note Be sure to review the examples and hints provided with e.docx
DOCX
NOTE A Power point presentation is also required along side this.docx
DOCX
No plagiarismBetween 10 and 15 relevant academic journals with H.docx
DOCX
No plagirism , please I need this on time due 41715 no work cited .docx
DOCX
no need outside source expect for Durkheims on suicideFor the t.docx
DOCX
No matter where I worked or what job I held, it was my interpersona.docx
DOCX
no more than 1,250 words. A strategic plan for ESPN, including the f.docx
DOCX
No other country in the world has a health care system like that of .docx
DOCX
NO PLAGARISM IF YOU CANNOT DO ORIGINAL AND GOOD QUALITY WORK, THE.docx
DOCX
New Opportunities in Community SettingsCommunity based nursing h.docx
DOCX
Nine-year-old Wandas teacher notices that for the past few weeks, W.docx
Not all countries have moved through all 4 phases of the demographic.docx
NOTE I need just 150-200 words answer with 1-2 references in APA. M.docx
Note I need 2 pages paper addressing the provided details. Please.docx
Not-for-profit organizations are using social media to redefine how .docx
North, South and West Please respond to the following (Note Pl.docx
North, South and West Please respond to the following (Note Plea.docx
No unread replies.88 replies.Go to httpwww.eagles.orgvu-.docx
Not only are people born into a specific culture, they also are soci.docx
NOTE I am very particular about my papers. Please do not respond if.docx
Note Be sure to review the examples and hints provided with e.docx
NOTE A Power point presentation is also required along side this.docx
No plagiarismBetween 10 and 15 relevant academic journals with H.docx
No plagirism , please I need this on time due 41715 no work cited .docx
no need outside source expect for Durkheims on suicideFor the t.docx
No matter where I worked or what job I held, it was my interpersona.docx
no more than 1,250 words. A strategic plan for ESPN, including the f.docx
No other country in the world has a health care system like that of .docx
NO PLAGARISM IF YOU CANNOT DO ORIGINAL AND GOOD QUALITY WORK, THE.docx
New Opportunities in Community SettingsCommunity based nursing h.docx
Nine-year-old Wandas teacher notices that for the past few weeks, W.docx

Recently uploaded (20)

PPTX
Computer Architecture Input Output Memory.pptx
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PDF
1_English_Language_Set_2.pdf probationary
PDF
advance database management system book.pdf
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
Hazard Identification & Risk Assessment .pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PDF
Indian roads congress 037 - 2012 Flexible pavement
PDF
HVAC Specification 2024 according to central public works department
PDF
Computing-Curriculum for Schools in Ghana
PPTX
Introduction to Building Materials
PPTX
TNA_Presentation-1-Final(SAVE)) (1).pptx
PDF
Trump Administration's workforce development strategy
PPTX
Introduction to pro and eukaryotes and differences.pptx
PPTX
20th Century Theater, Methods, History.pptx
PDF
What if we spent less time fighting change, and more time building what’s rig...
Computer Architecture Input Output Memory.pptx
Unit 4 Computer Architecture Multicore Processor.pptx
1_English_Language_Set_2.pdf probationary
advance database management system book.pdf
A powerpoint presentation on the Revised K-10 Science Shaping Paper
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Hazard Identification & Risk Assessment .pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
FORM 1 BIOLOGY MIND MAPS and their schemes
Indian roads congress 037 - 2012 Flexible pavement
HVAC Specification 2024 according to central public works department
Computing-Curriculum for Schools in Ghana
Introduction to Building Materials
TNA_Presentation-1-Final(SAVE)) (1).pptx
Trump Administration's workforce development strategy
Introduction to pro and eukaryotes and differences.pptx
20th Century Theater, Methods, History.pptx
What if we spent less time fighting change, and more time building what’s rig...

Network Security Strategy – ATTN  Computer ScienceAssignment is .docx

  • 1. Network Security Strategy – ATTN Computer Science Assignment is due by Thursday January 29 at midnight or 8AM Friday Morning at the latest. NO PLAGERISM !!!! Will pay $40 dollars. As Director of Information Security, you will conduct research into security mechanisms (hardware and software) that can expand and/or enhance your current security infrastructure. 1) Solution (s) should help protect against DoS (denial of service) attacks. 2) Be sure to look at Intrusion Detection/Prevention Systems. 3) Look at mobile computing solutions as well.
  • 2. 4) Focus on a defense-in-depth (layered) approach. Develop a strategy no more than 4-5 pages in length). The strategy should outline the various security controls that will be implemented and explain how each will be used to mitigate the internal/external security risks to your organization. Justify your choices and submit to the CIO for approval. Stakeholders are the Director of Information Security, 8 representatives from remote sites, IT Operations manager, Resource Manager, and your vendor for equipment and software. Criteria – Demonstrate a grasp of the problem and understanding of the key concepts - utilize diagrams and graphics as needed. Analysis – Apply Research and practical experiences of security mechanisms Conclusions and Recommendations – Close with strong conclusions that support your research Suggested Resources –