Examine network security of kundler networks

Assignment Help Computer Network Security
Reference no: EM13811947

Stage 1- (person 1) MY PART - Someone will need to do the benefits of risk assessments such as weigh the cost of doing risk of Kundler Shaving private chefs go to cooking displays, cost and safeguards of protecting personal shoppers info (address/contact info) used in frequent shopper program, insurance liability with chefs being customers home etc.

Stage 2- (person) - The next person will have to do evaluation of the physical security of the store to include (locks on sever rooms data and proxy card for access to sensitive information)

Stage 3- (person) - The next person will have to examine network security of Kundler networks to include routers and firewalls.

Person 4 - The last person will have to take all of the recommendations from the previous 3 stages and create a final evaluation recommendations report to include the requirements for future audit provisions the internal staff may use to validate the security measures in the system.

(Eli has chosen this portion) Person 5 - The final person will do the proofing, formatting, and submission of the paper.

Below are the requirements for the Week 5 assignment.

Develop a 3,000- to 3,500-word report for the CIO of Kudler Fine Foods.

  • This report should cover the material from the previous weeks, providing a comprehensive look at the key safeguards needed for the project at each stage of the systems development processes.
  • The report should have clear recommendations to ensure that the final frequent shopper program system is properly secured against likely threats.

Include the requirements for future audit provisions the internal staff may use to validate the security measures in the system.

Prepare a presentation to executive management at Kudler Fine Foods of the need to make the changes recommended in the paper.

  • The presentation should be 10 minutes in length.
  • The presentation must include appropriate graphics, and may be in a Microsoft PowerPoint presentation format.

Reference no: EM13811947

Questions Cloud

Discuss five issues that affect voter turnout : Discuss five issues that affect voter turnout in state and local elections.
Discuss the role of modern interest groups in politics : Discuss the role of modern interest groups in politics. When are these groups most effective. How has the role of political parties changed over the last three decades
Assignment exploring the art of indigenous cultures : Normal 0 false false false EN-US X-NONE X-NONE Exploring the Art of Indigenous Cultures:
How do the search results differ : How do the search results differ? Do you seem to be getting an unbiased listing of the best flights?
Examine network security of kundler networks : The next person will have to examine network security of Kundler networks to include routers and firewalls
What is bureaucracy : Discuss the role of modern interest groups in politics. When are these groups most effective. What is bureaucracy. Discuss purpose and problems.
Question regarding the whistle-blower definition and statute : After having reviewed the whistle-blower definition and statute, would you agree that despite having the whistle-blower statute in place, some employees are still apprehensive about coming forward with complaints? Please explain.
What is leadership style : What is Leadership Style? What type do you have and does it need changing? Can we change? When we read or talk about leadership style, it is the pattern of behavior used by a leader in attempting to influence (motivate) group members and make deci..
Explain provision protect the employer from civil lawsuits : How is the employer liable for workplace violence. Define the exclusivity provision, and analyze how this provision helps protect the employer from civil lawsuits that are associated with workplace violence

Reviews

Write a Review

Computer Network Security Questions & Answers

  Relationship between infrastructure and security

Justify and support the relationship between infrastructure and security as it relates to this data-collection and analysis company

  How security can be configured and provide configuration

Describe how the security can be configured, and provide configuration examples (such as screen-shots and configuration files). Marks are based on demonstrating technical detail and understanding, and choice of examples.

  Security vulnerabilities of authentication scheme

Clinet's MAC address is explicitly excluded in the AP/router configuration. What are the security vulnerabilities of this authentication scheme?

  How to calculate signatue for arbitrary integers

Describe how Trudy can now calculate your signature on (m1j m2k) mod n for arbitrary integers j and k. (you will also require to describe how she can also compute m1-1 mod n).

  Write the symbolic logic for the 3des decryption

How would you protect the passwords on your system using some of the mechanisms we have studied? Discuss implementation strategies and explain your decisions.

  Sony reels from multiple hacker attacks

Sony Reels from Multiple Hacker Attacks on page 252 in the text and answer the questions below. APA formatting guidelines require a title page, abstract page, and reference page in addition to the body of the paper.

  Desktop publishing system

Consider a desktop publishing system used to produce documents for various organizations. a. Give an example of a type of publication for which confidentiality of the stored data is the most important requirement

  New technologies using sophisticated anti-copying measures

Which is more probably to be effective in protecting intellectual property in digital media like CDs and DVDs: tougher copyright laws or new technologies incorporating more sophisticated anti-copying measures?

  List of security activities or controls

List a security program in each level and provide a list of security activities or controls applied in these levels. Support your list with real world application data

  Create an overloaded constructor

Create the statements to make an overloaded constructor for the class named Car. The constructors should support 0, 1, or 2 arguments. The 1st argument will denote engine size and contain an Integer.

  Summarize the current state of web application security

Summarize the current state of Web application security for your Board of Directors to understand. Determine any common themes that need to be addressed specific to the Web security.

  Describe the cyber attack lifecycle

Describe the cyber attack lifecycle. Describe a bot-net and how it can be used by hackers

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd