Describe the implementation process

Assignment Help Computer Network Security
Reference no: EM132000535

In this assignment, you will continue with the report for ABC, Inc. that you started in Week 1 Project and continued in Week 2 Project and Week 3 Project.

Remember to review the scenario document for the company profile and overall security objectives. Modify and correct the plan you created for Week 3 Project to accommodate suggestions and recommendations from your instructor and your own changes based on the readings and activities for this week.

Use Track Changes or color code your changes and additions so that the changes are easy to identify. For this assignment, you will continue to work on the security report for ABC, Inc. that you worked on in Weeks 1 to 3.In this week's assignment, you will consider event logging, antivirus software, and fault tolerance as well as the steps needed to verify the security recommendations you made in prior weeks and the current week.

Using your project report from Week 3 Project, complete the following tasks by adding 2- to 3-pages to the report: Modify the plan created in W3 Assignment 2 to accommodate suggestions and recommendations from your instructor and your own changes based on the readings and activities for this week.

Color code your changes to the report so that they are easy to identify. Recommend a mechanism that will record event data on the folders for each department. What events should be logged and how often do these logs need to be reviewed? Recommend an implementation for antivirus software. Suggest a product (or products) for the organization and explain your reason for choosing that product. Recommend a mechanism for monitoring security alerts on the server.

What types of events need to be monitored and how often do the security logs need to be reviewed by a human being as opposed to an automated process? Explain your answer.

Describe the implementation process and timeline for your recommendations. Try to give as reasonable a timeline as possible and explain your plan.

Expand the section of your report for verifying the implementation of the security recommendations for this week. Identify what is being tested for each verification activity.

This should include testing activities to make sure the security system is working properly. An example of this would be using an intentionally incorrect password to make sure the system does not allow the login.

Verified Expert

This paper is the fourth section of the system security improvements for ABC, Inc. Accordingly; various recommendations have been put forth in this solution. Among these include a mechanism to record event data on the folders for each department, the best for antivirus software and a mechanism for monitoring security alerts on the server. In addition, the paper has also addressed the issue of events that require monitoring, the timeline, and an explanation of what needs to be tested for verification exercise.

Reference no: EM132000535

Questions Cloud

An example of cultural entrepreneurship : An example of cultural entrepreneurship and a brief explanation of how the person, organization, institution, initiative, etc.
Contingency graph including breakeven mas loss and gain : Draw a final contingency graph including breakeven mas loss/gain.
Identify the different communication styles among genders : Imagine your team works for the training group in human resources and is assigned to develop training for employees going abroad for a business trip.
How much revenue should portsmith recognize : Construction began on July 1, 2014, How much revenue should Portsmith recognize on its December 31, 2014, income statement
Describe the implementation process : Describe the implementation process and timeline for your recommendations. Try to give as reasonable a timeline as possible and explain your plan
What is working capital management : What is Working Capital Management? What questions is it designed to answer?
What is happening with kids in middle childhood : What's your opinion about Kohlberg's theory of moral development? What do you think about Gardner's theory of multiple intelligence?
Proprietorship-partnership forms of business organization : What are the 4 primary disadvantages of the Sole Proprietorship and Partnership forms of business organization?
Analyzing markets for high-end manufactured products : You work as a stock analyst. You specialize in analyzing markets for "high-end" manufactured products.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd