Reasons why the company needs a security plan

Assignment Help Basic Computer Science
Reference no: EM131077338

Prepare a 15-slide presentation with speaker notes for Senior Management that will provide an outline for a Security Guidance plan encompassing best practices from key areas that were covered in this course.

Your plan should include the following areas:

  • Reasons why the company needs a security plan
  • Why an assessment should be performed to determine a baseline for the security in the company
  • How security best practices can be used and implemented to maintain systems and network security
  • Explanation of the difference between Business Continuity and Disaster Recovery and which the company should implement
  • Discussion of the Security Control methods and recommendation of one process for the company (in your notes explain why this method is best for the company)
  • Show the threat/attack risk mitigation strategies that can be used to enhance network and IT security

Note: You will not be developing the full security plan, but providing guidance on what the organization will need to consider when developing and implementing the plan. You may use writings from previous weeks in the course as draft documents to develop this more comprehensive guidance plan.

Develop a clear presentation with minimal text on each slide - utilize bullet points with your details in the speaker notes.  Provide charts and graphs of current statistics where necessary to emphasize your points.

Compile all files into a .zip folder.

Reference no: EM131077338

Questions Cloud

Using multisim construct the circuits : Which types of applications are field-effect transistors preferred over bipolar junction transistors? Why?  Explain why junction field-effect transistors are considered voltage-controlled devices.
What does ifconfig do in linux : 1. What does ifconfig do in Linux? 2.What are the ranges used for private ip addressing.
How is inventory described for your sec company : How is inventory described for your SEC 10-K company? LIFO, FIFO, and / or average cost? Relate your answer to topics in our course. Cost and sources for production materials: notice how cost is used in the SEC 10-K.
Charge of computer support : Your team is in charge of computer support at a major U.S. retailer. Business has been growing fast, and your company is about to open several new facilities across the country.
Reasons why the company needs a security plan : Prepare a 15-slide presentation with speaker notes for Senior Management that will provide an outline for a Security Guidance plan encompassing best practices from key areas that were covered in this course.
Analyze the trends that you observed with each company : Analyze the trends that you observed with each company. To what could you attribute the increases or decreases in each company's trend(s)?
Calculate the values of the infinite sequence : Math 121A: Homework 1. Two points P and Q are connected by a straight road of length d. At time t = 0, a car starts driving from P to Q at a constant speed c. Calculate the values of the infinite sequence a1, a2, a3, . . . of distances that the bee ..
Who do the sites promoting these toolsclaim to support : Who do the sites promoting these toolsclaim to support?
What is the size of your data set : What is the size of your data set - what level (scale) of measurement is applicable to your data (nominal, ordinal, interval, ratio)? Supportyour answer briefly.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  The decryption algorithm

Using RSA, encode the word "cat" by encrypting each letter separately. Choose p=3, q=11 and e=9. Apply then the decryption algorithm. Show all the calculation steps.

  Textbook ordering system deployment diagram

System architects and analysts use unified modeling language (UML) deployment diagrams to model the configuration of the hardware and software components of a system and how they will be deployed in a production environment. In other words, dep..

  Implement a super class person make two classes student

Implement a super class Person. Make two classes, Student and Instructor that inherit from Person. A person has a name and a year of birth. A student has major and the instructor has a salary. Write the class declarations, the constructors, and the m..

  Internet protocol version 4 (ipv4) is the fourth revision

Internet Protocol version 4 (IPv4) is the fourth revision in the development of the Internet Protocol (IP) and the first version of the protocol to be widely deployed. Together with Internet Protocol version 6 (IPv6), it is at the core of standards-b..

  Working with the osi model

Working with the OSI Model

  Where do othe researchers drop ff the ewaste

Where do othe researchers drop ff the ewaste and where does it end up?

  Increasingly hacker-intrusive network environment

Question 1 : What features of this product line do you feel will be instrumental in deploying your network in this increasingly hacker-intrusive network environment?

  A virtual boolean method that indicates

Data members should include all those inherited plus any you want to add  Member functions should include any inherited methods, plus at least  A virtual Boolean method that indicates whether the player gets another card  A method that announces that..

  Knowledge about the programming language c

The above segment descriptor describes a memory segment in terms of its start address, its size and whether it is ALLOCATED or FREE. This descriptor is part of a list (contains a pointer to next segment descriptor). Initially, there is only one se..

  Configure a computer for a proxy server

What two things are needed in order to configure a computer for a proxy server?

  Write a unit test of minmax in a main function

Write a function that computes the minimum and maximum of two integer variables and returns them through call-by-refernce parameters. It should have the following prototype: int minmax(int a, int b, int * min, int * max); Write a unit test of minm..

  Given a 3 millisecond seek time

Given a 3 millisecond seek time for a disk drive and assuming that once you reach the starting track you will write the file as contiguous sectors, how long will it take to write a 1 megabyte file? The disk rotates at 7200 rpm and each sector hold 1 ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd