The strategy should outline the various security controls
Course:- Business Management
Reference No.:- EM13773582

Assignment Help
Expertsmind Rated 4.9 / 5 based on 47215 reviews.
Review Site
Assignment Help >> Business Management

As Director of Information Security, you will conduct research into security mechanisms (hardware and software) that can expand and/or enhance your current security infrastructure.

1) Solution(s) should help protect against DoS (denial of service) attacks.

2) Be sure to look at Intrusion Detection/Prevention Systems.

3) Look at mobile computing solutions as well.

4) Focus on a defense-in-depth (layered) approach.

Develop a strategy no more than 4-5 pages in length). The strategy should outline the various security controls that will be implemented and explain how each will be used to mitigate the internal/external security risks to your organization. Justify your choices and submit to the CIO for approval.

Stakeholders are the Director of Information Security, 8 representatives from remote sites, IT Operations manager, Resource Manager, and your vendor for equipment and software.

Criteria - Demonstrate a grasp of the problem and understanding of the key concepts - utilize diagrams and graphics as needed.

Put your comment

Ask Question & Get Answers from Experts
Browse some more (Business Management) Materials
Explore the most useful mobile applications for a business or industry of your choice.  - Explore mobile applications for this business or industry that are not currently ava
Provide a review of what kind of campus and between building networking components and services are needed to ensure communication for the medica center. This should include
What are the different Access Control Models available to secure access to resources? Give an example of one that you have used in a work situation or if that is not possibl
Inadequate reward systems that do not reward employees for high performance are likely to lead to employees leaving or reducing productivity and quality to meet the lower st
Develop a SWOT analysis for a fictitious organization of your choice. Select a company you would like to own or be an executive of. Provide four variations as if the organiza
Research and identify a boundaryless organization of your choice. Is the organization successful? Why or why not? Who are they partnering with? What do you think are the
Julie is a fruit picker and has worked for the same company for three years. Between April and June 2005, she, along with 300 other fruit pickers, worked at this company. Th
What steps are involved in the delegation process? Are there any steps that should be included that are not already included? How does an effective delegation process affect