Companys needs for these types of security

Assignment Help Computer Network Security
Reference no: EM13854045

Your company is bought out by another company and there were massive layoffs. Your manager was one of the casualties. In the reorganization, your department was moved to the new parent company which means new coworkers and more importantly, a new boss as part of a new publishing company with 300 employees over 4 sites. Your new manager visited your new desk as you were unpacking your stapler and announced that you were the person with the most experience so they needed you to give a presentation to the other department managers on the need for physical security and adequately configuring your company's network to be secure. Since you don't have a list of equipment, you have a little leeway on what your presentation will include in that respect, however, for details on physical security, you have to make sure you include the basics. Make sure you detail what will deter hackers from breaking in. Be sure to include your references.

Submit a PowerPoint presentation with 8-10 (or more) slides that outlines your company's needs for these types of security, how it should be used, and how it is to be structured.

Attach the PowerPoint presentation to this assignment link. This assignment should adhere to the minimums for slide countand is due at the end of the academic week. It is worth 50 points, and a good presentation of the topic will get full credit. Ensure you're using standard formatting for presentations and that you cite and reference any sources used. Any misspellings or grammar issues will result in deductions from the total score. This assignment's score will appear in theonline grade book following the end academic week.

Research Paper Assignment - Milestone 2 - Abstract (Attach the Abstract to this Assignment)

The Research Paper abstract is due this week. Make sure you have read through the Research Paper Overview in the Research Paper folder. Submit the abstract in a single Word document by attaching it to this assignment using the link provided.


Attachment:- security.docx

Verified Expert

Reference no: EM13854045

Questions Cloud

Real return to capital in the export industry also decreases : "In a 2x2x2 Heckscher-Ohlin context, when a relatively labor-abundant country moves from autarky to trade, the real return to capital in the import-competing industry decreases and the real return to capital in the export industry also decreases."
Outline your findings on ethical standard for a corporation : Outline your findings on the ethical standard for a corporation's financial and tax reporting. State specific examples of the ethical standards and laws that you are following as the tax and financial analyst.
Is this hypocritical on the part of the government : What positive, or negative, effects on society can you identify? Is this hypocritical on the part of the government? Explain how it is, or is not, hypocritical
Banking system leads to an increase in the fed funds rate : Which of the following is a rate that should theoretically serve as a floor for the Fed funds rate? If a security dealer "repos securities," they are a.  An increase in the supply of reserves in the banking system leads to an increase in the Fed fund..
Companys needs for these types of security : Details on physical security, you have to make sure you include the basics. Make sure you detail what will deter hackers from breaking in. Be sure to include your references -
What and how much are the store owners implicit costs : The owner/manager of an athletic shoe store has revenue of $260,000 per year and labor, interest, inventory, and miscellaneous expenses of $200,000. The owner also owns the building the store is located in. It would rent out for $5,000 annually. What..
Geometric gradient series of cash flows : The future worth in year 10 of a geometric gradient series of cash flows was found to be $80,000. If the interest rate was 15% per year and the annual rate of increase was 9% per year, what was the cash flow amount in year 1?
What is the difference between an argument and a quarrel : What is the difference between an argument and a quarrel. You have probably never had to persuade someone to do anything.
How many streetlights are socially optimal : Suppose Chen has demand Q = 40 – 2P for streetlights and Abby has the demand Q = 10 – (1/2)P for streetlights. The cost of building each streetlight is $19. How many streetlights are socially optimal? Compare this socially optimal quantity with the q..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Create and describe a comprehensive security policy

Create and describe a comprehensive security policy for this data-collection and analysis company that will: Protect the company infrastructure and assets by applying the principals of confidentiality, integrity, and availability (CIA). Note: CIA i..

  Decision on it security investments

Discuss whether true unity is technically possible and why or why not If true unity is not technically possible, how should budgeters and policy-makers be guided to make the correct decision on IT Security investments?

  Create a memo for security controls and counter measures

Create a memo in which you do the following: Evaluate the likelihood of the threats discussed in part A. Recommend security controls and counter measures that should be instituted to mitigate these threats.

  Write paper about stuxnet virus

Select a research topic from the list below. After selecting your topic, research the incident using news articles, magazine articles (trade press), journal articles, and/or technical reports from government and industry. Write paper about Stuxnet..

  Biggest new technology

Question 1: What are some problems with not adding data integrity for your input strings? Example: If you are asking for an amount and when you can put in a letter. Question 2: What is one security issue that can take place with an interface? Expla..

  How must one-s privacy be legally protected or secured

What does privacy mean to you? Is privacy a right or a privilege? How should one's privacy be legally protected or secured, especially when using the Internet?

  Development for critical infrastructure protection

Identify the state actors and non-state actors that pose the greatest cyber threat to the United States and justify your selections - describe how the mix of state and non-state actors you identified should affect policy maker decision-making and..

  Define the information security governance and management

Define the information security governance and management tasks that senior management needs to address.Describe the outcomes and the items that will be delivered to the organization through the information security program.

  Provide an overview of intellectual property law

Intellectual property law is a major issue facing organizations, and many organizations have been fined significant amounts for violations of intellectual property law. Provide an overview of intellectual property law

  Assess the levels of responsibility between government

write a three to fivenbsp page paper in which youdescribe the impact and the vulnerability of the scada stuxnet worm

  How many other messages expected to generate same hash value

A 1,048,576-bit message is used to generate 10-bit hash. One average, how many other messages could be expected to generate same hash value?

  Change the php script to prevent such attacks

Briefly explain each rule in the rule - How would James need to change the PHP script to prevent such attacks?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd