Define all hardware and software devices

Assignment Help Computer Network Security
Reference no: EM134000785

Assignment:

It is essential as a security expert to be able to evaluate potential risks within a security infrastructure in order to position security controls/countermeasures. The system design document (SDD) describes the high-level system design and the low-level detailed design specifications from which a system is built. As part of the security development team, this document provides the information necessary for designing and implementing a system.

Ndzovu & Sons Corporation is a retail business dealing with groceries with five departments ( Deli, Pharmacy, Produce, Dairy, and grocery) in each of its stores spread across Northern America with its headquarters in Winchester, Virginia.

Design document and the overall security architecture structure diagram for your current organization

Part 1: Security Architecture

Address the following:

1. Identify and define all hardware and software devices, and the different types of sensitive data the organization will store.

2. Explain the organization's technical requirements in compliance with all devices and services internally and externally that could be a potential target for cyberattacks.

3. Describe in-depth how the security controls and services are positioned, and how they relate to the overall systems architecture to prevent attacks.

4. Demonstrate restricting access, layering security, employing authentication, encrypting storage, and automating data security by including the full scope of policy, procedural, and technical responsibilities in the IT infrastructure.

5. Apply knowledge to effectively manage a security program.

6. Assess the effectiveness of a security program.

Part 2: System Design

Address the following:

1. Describe the design goals and considerations, and articulate threat modeling, providing a high-level overview of the security architecture.

2. Describe the security baselining and the data design associated with the system, and explain the human-machine interface and operational scenarios.

3. Design a high-level system diagram that further deconstructs into low-level detailed design specifications for each system component, including hardware, internal communications, software, system integrity controls, and external interfaces, all of which are a part of the program monitoring and control.

4. Describe the importance of secure software, and the programming practices, development processes, and methodologies that lead to secure software.

Reference no: EM134000785

Questions Cloud

How has cloud computing influenced the it field : How has cloud computing influenced the IT field? How will the cloud computing concepts you learned in this course influence your future?
How iso-iec 27002 pertains to information security : In 720 to 850 WORDS, Explain, How ISO, IEC 27002 pertains to Information Security?
Why is this type of attack harmful to businesses : Why is this type of attack harmful to businesses? What are some mitigation techniques you would recommend?
What is principles of protective security : What is principles of protective security? What are the pros and cons and provide reference.
Define all hardware and software devices : Identify and define all hardware and software devices, and the different types of sensitive data the organization will store.
Formulate risk approaches that can deal with complex systems : Formulate risk approaches that can deal with complex systems and also systems distributed across multiple locations and platforms.
Do you think its necessary to clean up the win sxs folder : Do you think it's necessary to clean up the Win SxS folder?
Drawbacks to egoism and contractarianism in the practical : What are the benefits and drawbacks to Egoism and Contractarianism in the practical, ethical dilemmas of everyday life?
What should it department do if an employee goes on vacation : What should a IT department do if an employee goes on vacation and is the Sole IT person to mitigate and solve problems that may arise with the system.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd