Reference no: EM133040901
Often cybersecurity professionals forget the easiest way to access a system is through the front door and not using a computer from 100 miles away. By creating a castle in which both physical and network security defenses are defined, it holds off intruders.
Part 1:
Create a digital diagram of a castle, complete with all the necessary components, and include the following:
Gateway router
Firewall
Anti-Virus
VPN
SIEM
Data backup
Server
IPS
DMZ
MultiFactor Authentication
Part 2:
Write a analysis about your castle, addressing the following:
Within each defensive layer of the castle, identify the physical security aspect of the defensive structure and the technical aspect designed to protect the king, the server. (For instance, the castle gate would be considered a physical barrier and gateway router to a system. Not every portion of the diagram may have both a physical and technical aspect.)
Incorporate within the design the physical security elements (deterrence, detection, delay, response) by identifying them throughout your castle design. Provide an explanation of the design for a professional nontechnical audience.
Describe cyber defense tools, methods, and components, and explain how to apply cyber defense methods to prepare a system to repel attacks.
|
Is the problem rooted in the literature
: Is the topic attainable for a first-time dissertation student? Is the problem rooted in the literature? Is there a theoretical model or framework discussed?
|
|
Blockchain-big data and government and policies
: Explain the major components of blockchain. Be sure to include how blockchain is affecting a global economy and how you see it growing in the future.
|
|
Future career as cybersecurity professional
: How you will apply this to your future career as a cybersecurity professional.
|
|
Concepts of cybersecurity
: Throughout this course, you have learned many concepts of cybersecurity and begun your path into the field.
|
|
Create digital diagram of castle
: Create a digital diagram of a castle, Describe cyber defense tools, methods, and components, and explain how to apply cyber defense methods to prepare a system
|
|
Customer success stories
: One important piece of project reflection and creating future proposals is to use customer success stories.
|
|
Data Warehouse Architecture
: Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse.
|
|
Data Mining
: Denote what the study was about. Discuss how random-field theory was used in the case study. What were the results of the false recovery rate in the study?
|
|
Understanding of big data
: Describe your understanding of big data and give an example of how you've seen big data used either personally or professionally.
|