Create and describe a comprehensive security policy
Course:- Computer Network Security
Reference No.:- EM13778723

Assignment Help
Expertsmind Rated 4.9 / 5 based on 47215 reviews.
Review Site
Assignment Help >> Computer Network Security

Write a four to six (4-6) page infrastructure document in which you:

Justify and support the relationship between infrastructure and security as it relates to this data-collection and analysis company.

Present the rationale for the logical and physical topographical layout of the planned network.

Design a logical and physical topographical layout of the current and planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.

Illustrate the possible placement of servers including access paths to the Internet, intrusion detection systems (IDS), and firewalls. Note: Facility limitations, workstations, databases, printers, routers, switches, bridges, and access points should be considered in the illustration.

Create and describe a comprehensive security policy for this data-collection and analysis company that will:

Protect the company infrastructure and assets by applying the principals of confidentiality, integrity, and availability (CIA). Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three (3) core goals of confidentiality, integrity, and availability of information.

Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.

Put your comment

Ask Question & Get Answers from Experts
Browse some more (Computer Network Security) Materials
Prepare a report on the following scenario about security and privacy in cloud computing - Recently increased use of mobile devices and the growth of the Internet in current
Consider a desktop publishing system used to produce documents for various organizations. Give an example in which system availability is the most impotent requirement. Plea
Determine how an investigator can plan for hardware, software, and / or general failures during data acquisition - Describe the acquisition procedures and tools for Windows an
For Reflective Article Paper 3, select an article that details current methods that are used to successfully prevent identity theft. Discuss what security policies commerce
Countermeasures to consider for your responses: Fix known exploitable software flaws Develop and enforce operational procedures and access controls (data and system) Provide
Which is more likely to be effective in protecting intellectual property in digital media such as CDs and DVDs: tougher copyright laws or new technologies incorporating more
Identify potential solutions for these issues and evaluate their ability to protect both payers and receivers. You must remember this homework has to be plagiarism free than
You must include in your investigation protection of both transmitted information also sensitive data stored locally in computer databases.