Explain network security management-flow diagram

Assignment Help Computer Network Security
Reference no: EM1367259

Network Security Management-flow diagram, assets and detail of functions (see case study MIIS after questions). I have completed the assets and flow diagrams and interfaces.

Homework Question
1. Start the systems engineering on the for MIIS, based on the prior homework assignments:

a. Decompose MIIS into the basic functions that are required: provide a brief description of each component, and put together a MIIS functional architecture diagram that shows these functions, the interfaces among the functions, and the interfaces to things outside of MIIS.
b. Create an Information Asset Inventory of all the security critical data items in MIIS. Note that these assets should be an important subset of all the IT assets.
c. For each item in the Information Asset Inventory, identify all the functions that it used in and every interface it goes over. This will help to see where each of the information assets has to be protected: the places where it is stored, and the places where it is "in transit" This is key step in the security engineering for the homework and for the project.
d. Use the set of prioritized risks from last week as the basis for a set of security requirements for MIIS. These priorities should have been based on the combination of impact and likelihood, with the most important (highest impact, highest likelihood) as the highest priority. Since the list is prioritized, you can shorten the list by eliminating the least important ones such as the low/low, low/medium, medium/low impact/likelihood risks (assuming you used at least a 3 choice scale for impact and likelihood, and low, medium are the two lowest points on the scale). Be clear, however, about which risks you are dropping. This is primarily to save work on this and the next homework. In practice, you may or may not drop the lowest priority risks.
e. Allocate these requirements to the appropriate elements of the MIIS functional architecture in part a of this homework.

Reference no: EM1367259

Security of information in government organisations

Complete a research essay about information security. The research provides you with the opportunity to complete research and demonstrate knowledge of information security

Discuss whether private industry now has a responsibility

Clearly discuss whether private industry now has a responsibility to protect national security through implementing good cybersecurity controls imposed by government regulat

Applications of systems development models

The Systems Development Life Cycle methodology is excessively formal and rigid and should be more flexible and unstructured? - review your original position in light of the c

Perform security exploits on web applications and websites

SIT704 - Advanced Topics in Digital Security - Perform security exploits on web applications and websites and you may choose to use WebGoat and any appropriate tools from the

What are the characteristics of people in india

What are the characteristics of people in India who commit white collar crime (e.g: age, occupation or profession, lifestyle). Find a case of white collar crime that occurr

Analyse how trust is used in controlling access

Analyse how trust is used in controlling access to resources. Evaluate the proposed solution used in emergent environments such as BYOD, cloud and pervasive environments.

Openpgp-compliant email software package on your computer

Install an OpenPGP-compliant email software package on your computer, like any of the ones found at the OpenPGP Alliance (n.d.) Web site or any product in compliance with RF

What are your thoughts on cyber criminals stealing

What are your thoughts on cyber criminals stealing healthcare records? What do you think is causing this sudden increase in medical record theft? In your opinion, what are som


Write a Review

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd