+1-415-670-9189
info@expertsmind.com
Companys needs for these types of security
Course:- Computer Network Security
Reference No.:- EM13854045




Assignment Help
Expertsmind Rated 4.9 / 5 based on 47215 reviews.
Review Site
Assignment Help >> Computer Network Security

Your company is bought out by another company and there were massive layoffs. Your manager was one of the casualties. In the reorganization, your department was moved to the new parent company which means new coworkers and more importantly, a new boss as part of a new publishing company with 300 employees over 4 sites. Your new manager visited your new desk as you were unpacking your stapler and announced that you were the person with the most experience so they needed you to give a presentation to the other department managers on the need for physical security and adequately configuring your company's network to be secure. Since you don't have a list of equipment, you have a little leeway on what your presentation will include in that respect, however, for details on physical security, you have to make sure you include the basics. Make sure you detail what will deter hackers from breaking in. Be sure to include your references.

Submit a PowerPoint presentation with 8-10 (or more) slides that outlines your company's needs for these types of security, how it should be used, and how it is to be structured.

Attach the PowerPoint presentation to this assignment link. This assignment should adhere to the minimums for slide countand is due at the end of the academic week. It is worth 50 points, and a good presentation of the topic will get full credit. Ensure you're using standard formatting for presentations and that you cite and reference any sources used. Any misspellings or grammar issues will result in deductions from the total score. This assignment's score will appear in theonline grade book following the end academic week.

Research Paper Assignment - Milestone 2 - Abstract (Attach the Abstract to this Assignment)

The Research Paper abstract is due this week. Make sure you have read through the Research Paper Overview in the Research Paper folder. Submit the abstract in a single Word document by attaching it to this assignment using the link provided.


Attachment:- security.docx

Answered:-

Verified Expert


Preview Container content

Abstract

Physical security is the basis of information security implementation for an organization. However, most of the times, this requirement is overlooked. Physical security is aimed at protecting employees and information technology infrastructure of an organization along with helping better implementation of software based security measurements. Lack of physical security measurements open up risks and threats of insider attacks like physical theft of data, damage of equipment, unauthorized access and so on. Identifications of physical security loopholes must be uncovered and resolved before an attacker exploits those loopholes. Some key measurements for implementation of physical security include locking up important resources, monitoring, data backup, video surveillance and creating awareness among employees.

Introduction

A computer network works as a backbone for the information technology infrastructure of an organization. To make a network secure, it needs to work from the bottom level of the networking model. Hence, it needs to start from physical security and work up to application level security.

Physical security is very much important as it makes the foundation of all other information security strategies and policies. Software based information security implementations will work efficiently only when the physical infrastructure is also well protected.

There are a number of information security risks and threats, both for physical security and software based security controls. Also, there are various tools and techniques to deal with those risks and threats. It needs proper configurations for information security controls to achieve higher level of information security for the organization.

Physical Security

While developing and configuring a network, an organization overlook the importance of physical security of the network most of the time. Physical security of a network is all about protecting the components of the network including equipment and the people who use the network. Physical security is more focused on securing the most important part of an organization, the employees of the organization. Apart from that, it helps in dealing with security risks like insider attack, physical theft of data and strengthening the upper level security measurements.




Put your comment
 
Minimize


Ask Question & Get Answers from Experts
Browse some more (Computer Network Security) Materials
A virus is a program that attaches itself to other programs. An infected user must take some sort of action to spread a virus to others. A worm functions as an independent p
Another variation of Additive cipher uses a keyword instead of a single key. This cipher is called Vigenere cipher. Both variations work exactly the same.
Using statistical analysis only on Caesar cipher, decrypt this cipher. Show your work in detail. Do not use brute force - De-cipher the following message using Vigenere Cipher
Typically the public SSH keys used by servers are not signed by any certificate authority, but the SSH protocol does support checking certificates. Why, in practice, are ser
Discuss the advantages and disadvantages of star, bus, and mesh physical topologies. Provide real examples of each type and explain why the OSI model is better than the TCP/
Analyze a well-designed risk management plan to determine how it can prevent risk and control residual risk. Identify what you believe to be the most important step in the r
Review the Risk section of the company's SEC Form 10-K. Develop a list of 5 or more specific cyberspace or cybersecurity related risks which the company included in its repo
Assessment Three - Cyber intelligence is the ability to define, explore and analyse information security threats. Advanced adversaries accomplish their goals using advanced