State the problem from the ceos perspective

Assignment Help Computer Engineering
Reference no: EM133577497

Assignment: Securing the Computing Infrastructure

Consider the following business problem:

Your organization has been very concerned with the recent data breaches across the United States. The chief executive officer (CEO) has summoned his executives to look at IDSs/IPSs to help protect the organization's computing infrastructure. As an IT manager for the organization, you have been asked to attend the meeting with your chief information officer (CIO). In the meeting, your CIO projected the network diagram and announced that the IT department will purchase five IDS/IPS. There are three main types of IDSs/IPSs-host-based intrusion detection system (HIDS), network-based intrusion detection system (NIDS), and wireless intrusion detection system (WIDS). In your initial post, select a total of five IDSs/IPSs from the three main types of IDSs/IPSs, and explain how each of your selections will protect the infrastructure depicted in the diagram.

In addition, you have been tasked with explaining to a team of executives, in layman's terms, where you will strategically place the five IDSs/IPSs and how each placement will best serve the organization. For this portion of the interactive assignment, you will create a five-minute maximum screencast presentation of a PowerPoint that provides this explanation. For the screencast portion you may use any screencasting platform you wish. (Quick-start guides for Screencast-O-Matic and Jing are provided for your convenience.)

Create your PowerPoint presentation including the following elements.

1) State the problem from the CEO's perspective.

2) Explain in layman's terms the design and use of IDS/IPS within the network, including the specific locations for each chosen system.

3) Justify the use of the chosen IDSs and how these will protect the various subnets of the network.

4) Explain how each of these solutions presented can address the CEO's concerns.

Include visual enhancements in your presentation. These may include appropriate images, a consistent font, appropriate animations, and transitions from content piece to content piece and slide to slide. (Images should be cited in APA format as outlined by the Writing Center. Students may wish to use the ISM642 Where to Get Free Images Download ISM642 Where to Get Free Images guide for assistance with accessing freely available public domain and/or Creative Commons licensed images.) It is recommended that you access Garr Reynolds's Top Ten Slide Tips that provides useful assistance with creating successful PowerPoint presentations.

After you have created your PowerPoint, you will create a screencast of your presentation using the screencasting software or platform of your choice. (Quick-start guides for Screencast-O-Matic and Jing are provided for your convenience.) Your screencast may be three to five minutes long, but it may not exceed five minutes. (It is highly recommended that you create a script and/or speaker's notes for your PowerPoint to ensure that your screencast will meet the time requirements. This will also allow you to practice your presentation prior to recording it.) Once your screencast has been created, copy and paste the URL to your screencast into the initial post and attach your PowerPoint presentation to the post prior to submitting.

Reference no: EM133577497

Questions Cloud

Discuss some of the cautions that you may have had : After completing the necessary readings, discuss some of these cautions that you may have had to overcome over the past couple of years.
Risk assessment methodology related to reentry into society : Discuss advantages and disadvantages of the risk assessment methodology related to reentry into society.
Type of fraud be detected and prevented : Provide an overview of the case JM3 Construction LLC . How can this type of fraud be detected and prevented? What role would the expert play in this case?
How power is used to enforce and reinforce gender roles : How structures, organizations and laws affect our understanding of gender, discuss how power is used to enforce/reinforce gender roles.
State the problem from the ceos perspective : State the problem from the CEO's perspective. Explain how each of these solutions presented can address the CEO's concerns.
Add a new project and assign it to an existing contract : Add a new project and assign it to an existing contract, Modify an existing project, Delete a project, and Remove a project from a contract.
Criminal cases-civil penaltie for tax fraud applies in civil : The federal exclusionary rule Group of answer choices applies only in criminal cases applies in criminal cases and civil penaltie for tax fraud applies in civil
Harold wall has committed assault causing bodily harm : You have conducted a criminal investigation and developed reasonable grounds to believe that Harold Wall has committed an assault causing bodily harm
Analyzing the jobs of corrections officer : Write a page length introduction analyzing the jobs of a Corrections officer, Judge, and a Patrol Officer, and detailing what their responsibilities are.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd