Explain network security management-flow diagram

Assignment Help Computer Network Security
Reference no: EM1367259

Network Security Management-flow diagram, assets and detail of functions (see case study MIIS after questions). I have completed the assets and flow diagrams and interfaces.

Homework Question
1. Start the systems engineering on the for MIIS, based on the prior homework assignments:

a. Decompose MIIS into the basic functions that are required: provide a brief description of each component, and put together a MIIS functional architecture diagram that shows these functions, the interfaces among the functions, and the interfaces to things outside of MIIS.
b. Create an Information Asset Inventory of all the security critical data items in MIIS. Note that these assets should be an important subset of all the IT assets.
c. For each item in the Information Asset Inventory, identify all the functions that it used in and every interface it goes over. This will help to see where each of the information assets has to be protected: the places where it is stored, and the places where it is "in transit" This is key step in the security engineering for the homework and for the project.
d. Use the set of prioritized risks from last week as the basis for a set of security requirements for MIIS. These priorities should have been based on the combination of impact and likelihood, with the most important (highest impact, highest likelihood) as the highest priority. Since the list is prioritized, you can shorten the list by eliminating the least important ones such as the low/low, low/medium, medium/low impact/likelihood risks (assuming you used at least a 3 choice scale for impact and likelihood, and low, medium are the two lowest points on the scale). Be clear, however, about which risks you are dropping. This is primarily to save work on this and the next homework. In practice, you may or may not drop the lowest priority risks.
e. Allocate these requirements to the appropriate elements of the MIIS functional architecture in part a of this homework.

Reference no: EM1367259

Questions Cloud

Explain johnson-johnson-s approach for it infrastructure : Discuss Johnson & Johnson's Approach ro providing an IT infrastructure to support its one-face-to-the-customer strategy?
Elements of power-self image and knowledge : Consider the elements of power, self-image, knowledge, and problem-solving that can serve as impediments.
Business formation codes : Explain the process for obtaining an annual filing report for a corporation currently registered in California
How fast would the police officer be travelling : A car speeds past a stationary police officer while travelling 115km/h. The officer immediately begins pursuit at a constant acceleration of 10.20 km/h/s (note the mixed units), just as the driver passes the officer.
Explain network security management-flow diagram : Network Security Management-flow diagram, assets and detail of functions. I have completed the assets and flow diagrams and interfaces. Start systems engineering on for MIIS, based on prior homework assignments:
Design simple interface hardware : Evaluate the capability in selecting and configuring a microcontroller unit designing simple interface hardware and writing subroutines to operate those interfaces
Compute number of units and unit price : Consider a market characterized by the following inverse demand and supply functions: PX = 10 - 2QX and PX = 2 + 2QX?
Health care service-quality or standards : How can we measure the fact that health care service is meeting that quality or standards, (other than surveys)? What sources of evidence do we rely?
Find out the greatest horizontal range of the rocket : A crate is sliding down a ramp that is inclined at the angle of 33° above the horizontal. The coefficient of kinetic friction between the crate and the ramp surface is 0.479. Find the acceleration of the moving crate.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explain two-bit system noninterference-secure

The initial state is not output (in contrast to the example). Is this version of two-bit system noninterference-secure with respect to Lucy? Why or why not?

  Explaining ethical issues and the abuse of privacy

Search the Internet for good examples of cases that involve ethical issues and the abuse of privacy. Provide a review and analysis of your findings.

  Ip spoofing

honeypot or a firewall, error handling, Denial-Of-Service, Public Key Infrastructure, WLAN Administrator, WEP Protocol, RSA Algorithm, Network Engineer

  Create class to maintain personal budget for a year

Create a class to maintain a personal budget for a year. The name of this class is Budget. The data your class will need, at a minimum.

  Calculate an rsa signature on a long message

Would it be reasonable to compute an RSA signature on a long message by ?rst computing what the message equals mod n, for some ?xed n and then signing this computed value only. Why or why not?

  Organization-severely lacks in appreciating need security

Organization that severely lacks in appreciating the need for security or a company that depends on equipment that is outdated and services from contractors that are low quality? Why?

  Strong ciphers produced by the enigma machine

Concur with, dispute, or qualify following statement: "The strong ciphers produced by Enigma machine are  result of complex mathematical trapdoor functions used to encrypt messages."

  Find sequence of courses to satisfy all prerequisites

Bob loves foreign languages and wants to plan his course schedule for the following years. He is interested in the following nine language courses: LA15, LA16, LA22, LA31, LA32, LA126, LA127, LA141.

  Find time when station c hears the collision

The size of the frame is long enough to guarantee the detection of collision by both stations. Find: The time when station C hears the collision (t3).

  Symmetric encryption algorithms

block cipher and a stream cipher, Caesar cipher, cryptanalytic attacks, mono alphabetic cipher and a poly alphabetic cipher, Mix Columns, Add Round key, PGP services, traffic padding, contrast link and end-to-end encryption

  Propose plan that focuses on password policies-

Propose a detailed plan that focuses on password policies and authentication methods to protect the project from becoming public during the research and development phase.

  Eu data privacy regulations for protection of employee data

How does EU directive on protection of personal data impose requirements on organizations in non-EU countries? How does Kraft comply with EU data privacy regulations governing protection of employee data?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd