Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Description Key Assignment Security Management DocumentUse WordTitle pageCourse number and nameProject nameYour nameDateTable of Contents (TOC)Use an autogenerated TOC.This should be on a separate pag

Description

Key Assignment

  • Security Management Document
    • Use Word
    • Title page
      • Course number and name
      • Project name
      • Your name
      • Date
    • Table of Contents (TOC)
      • Use an autogenerated TOC.
      • This should be on a separate page.
      • This should be a maximum of 3 levels deep.
      • Be sure to update the fields of the TOC so that it is up-to-date before submitting your project.
    • Section headings
      • Week 1: Introduction to Information Security
        • This section will describe the organization and establish the security model that it will use.
      • Week 2: Security Assessment
        • This section will focus on risks that are faced by organizations and how to deal with or safeguard against them.
      • Week 3: Access Controls and Security Mechanisms
        • This section examines how to control access and implement sound security controls to ensure restricted access to data.
      • Week 4: Security Policies, Procedures, and Regulatory Compliance
        • This section will focus on the protection of data and regulatory requirements that the company needs to implement.
      • Week 5: Network Security
        • This section combines all of the previous sections and gives the opportunity to examine the security mechanisms that are needed at the network level.
    • Include cover, outline, abstract, and Reference pages.

The case study company has expressed a desire to have a secure company-wide network infrastructure. Because the network has to be re-evaluated from the beginning, the company wants to ensure that the new network has as many reasonable security controls and mechanisms in place. What solutions can you propose to support these initiatives? Create the following section for Week 5:

  • Week 5: Network Security
    • Propose an appropriate network infrastructure that offers sound security practices for the existing intranet and the new proposed expansion.
    • Create and describe a diagram of the network architecture, discussing how it can meet the goals of the company.
    • Describe the access controls and how the company can ensure that devices and the topology are effective and working to protect the company infrastructure.
    • Review and describe the need for intrusion detection systems (IDSs) and intrusion prevention systems (IPSs) based on research of the latest elements of intrusion detection and prevention available.
    • Discuss how they can effectively be used in a network operations setting.
    • Ensure that there is an appropriate use of the IDSs and IPSs in the network diagram.
  • Section 5 should be 4–5 pages long (2–3 pages of network topology, 1–2 pages of IPSs and IDSs).
  • As a final deliverable to the management team, create a Power Point presentation that summarizes the solutions outlined in the Key Assignment template. In addition, describe why the proposed solution is the correct method or mechanism to be implemented. Remember that the presentation is for the management team and should contain the appropriate level of detail.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

The Impact Of Technology On OrganizationsWk 8 – Summative Assessment: Technology-Management Plan Imagine this scenario: You are a technology development consultant for a large service organization. Ex

The Impact Of Technology On OrganizationsWk 8 – Summative Assessment: Technology-Management Plan Imagine this scenario: You are a technology development consultant for a large service organization. Executive leadership has given you the responsibility of developing a technology-management plan. Write a 1,400- to 1,750-word paper in which you evaluate the management

Review the journal article Employees Adherence to Information Security Policies, link is https://cdn.inst-fs-iad-prod.inscloudgate.net/ec5f46b2-1b12-45f2-915b-5f6549eafab9/Employees’%20adherence%20to%

Review the journal article Employees Adherence to Information Security Policies, link is https://cdn.inst-fs-iad-prod.inscloudgate.net/ec5f46b2-1b12-45f2-915b-5f6549eafab9/Employees’%20adherence%20to%20information%20security%20policies%2C%20An%20exploratory%20field%20study.pdf?token=eyJhbGciOiJIUzUxMiIsInR5cCI6IkpXVCIsImtpZCI6ImNkbiJ9.eyJyZXNvdXJjZSI6Ii9lYzVmNDZiMi0xYjEyLTQ1ZjItOTE1Yi01ZjY1NDllYWZhYjkvRW1wbG95ZWVzJUUyJTgwJTk5JTIwYWRoZXJlbmNlJTIwdG8lMjBpbmZvcm1hdGlvbiUyMHNlY3VyaXR5JTIwcG9saWNpZXMlMkMlMjBBbiUyMGV4cGxvcmF0b3J5JTIwZmllbGQlMjBzdHVkeS5wZGYiLCJ0ZW5hbnQiOiJjYW52YXMiLCJ1c2VyX2lkIjoiMTA2ODUwMDAwMDAwMDQzMzcwIiwiaWF0IjoxNzYzNTQ4NDcxLCJleHAiOjE3NjM2MzQ4NzF9.N2vrrvQr2t-MEPVDw54kLc_ZoekbOAfWUj5-WoCgT_ds070e01CRec1N_arz8LZJppTgz5rKQA9GNAcZWaQ2OQ&download=1&content_type=application%2Fpdf The essay should reflect your understanding of your textbook readings and the journal article. You are free to use any other relevant references beyond the prescribed texts. Summarize the article’s main points, and answer the following questions. What

In this chapter you learned about system architecture. This exercise helps to deepen the understanding of system architecture concepts and the process of translating logical designs into physical blue

In this chapter you learned about system architecture. This exercise helps to deepen the understanding of system architecture concepts and the process of translating logical designs into physical blueprints for information systems. Instructions: Answer the following questions: Describe the steps involved in translating a logical design into a physical blueprint

Tip Top Toys is a relatively small division of Worldwide Enterprises. Worldwide has nine other divisions, which include insurance, healthcare products, and financial planning services, to name a few.

Tip Top Toys is a relatively small division of Worldwide Enterprises. Worldwide has nine other divisions, which include insurance, healthcare products, and financial planning services, to name a few. The corporate marketing director for Worldwide has requested Tip Top’s customer shopping data to target people who might be likely to

Review the journal article, What We Talk About When We Talk About “Reasonable Cybersecurity”, by Kevin L. Miller. The essay should reflect your understanding of your textbook readings and the journal

Review the journal article, What We Talk About When We Talk About “Reasonable Cybersecurity”, by Kevin L. Miller. The essay should reflect your understanding of your textbook readings and the journal article. You are free to use any other relevant references beyond the prescribed texts. Summarize the article’s main points, and

Discuss the importance of user interfaces in technology and the principles of HCI. Objective: In this chapter you learned about the principles and best practices of designing user interfaces and sourc

Discuss the importance of user interfaces in technology and the principles of HCI. Objective: In this chapter you learned about the principles and best practices of designing user interfaces and source documents/forms. Instructions:  Choose a specific topic related to user interfaces and HCI (e.g., the importance of user research, the role

In this reflective activity, you will reflect on your understanding of how data is organized, stored, and managed, and to recognize the importance of mastering data design for systems analysts.For thi

In this reflective activity, you will reflect on your understanding of how data is organized, stored, and managed, and to recognize the importance of mastering data design for systems analysts. For this Reflection activity, research and answer the following questions: In 1000 words, how would you explain the importance of

Review the journal article about cloud security in healthcare, “Data Privacy in Cloud-assisted Healthcare Systems: State of the Art and the Future Challenges“ by Anam Sajid and Haider Abbas and provid

Review the journal article about cloud security in healthcare, “Data Privacy in Cloud-assisted Healthcare Systems: State of the Art and the Future Challenges“ by Anam Sajid and Haider Abbas and provide ALL of the following information: A summary of the article’s main points List and summarize the main areas of

Discuss the difference between a logical model and a physical model. Objective: In this chapter you learned that systems development involves creating models to understand and design information syste

Discuss the difference between a logical model and a physical model. Objective: In this chapter you learned that systems development involves creating models to understand and design information systems. This exercise explores the relationship between logical and physical models in the context of systems development. Instructions: Answer the following questions: Why is it essential

In this reflection activity, we will explore the concept of object modeling, its significance in software development, analyze the benefits of using object-oriented approaches, and consider real-world

In this reflection activity, we will explore the concept of object modeling, its significance in software development, analyze the benefits of using object-oriented approaches, and consider real-world scenarios where object modeling plays a crucial role. Begin by reviewing the object modeling information in Chapter 6. Pay attention to the key

Your supervisor manages the corporate office where you work as a systems analyst. Several weeks ago, after hearing rumors of employee dissatisfaction, they asked you to create a survey for all IT empl

Your supervisor manages the corporate office where you work as a systems analyst. Several weeks ago, after hearing rumors of employee dissatisfaction, they asked you to create a survey for all IT employees. After the responses were returned and tabulated, your supervisor was dis-appointed that many employees assigned low ratings

The computer science instructor at a local high school asked you to visit her class and give a presentation about project management. You have just a few days to prepare, and you need to develop a pre

The computer science instructor at a local high school asked you to visit her class and give a presentation about project management. You have just a few days to prepare, and you need to develop a presentation that describes project management, project management tools and techniques. Thinking about what to

Information Systems for Life: Chapter 4 Activity: Discuss the key benefits and challenges of Joint Application Development (JAD). Objective: In this chapter you learned that joint application developm

Information Systems for Life: Chapter 4 Activity: Discuss the key benefits and challenges of Joint Application Development (JAD). Objective: In this chapter you learned that joint application development (JAD) is a user-oriented technique for fact-finding and requirements engineering. This exercise strengthens the understanding of techniques used to capture a comprehensive and accurate

Activity: Discuss the importance of effective communication within systems projects. Objective: In this chapter you learned that effective communication is a critical aspect of systems projects. This

Activity: Discuss the importance of effective communication within systems projects. Objective: In this chapter you learned that effective communication is a critical aspect of systems projects. This exercise highlights the impact of effective communication on a company’s systems projects. Instructions: Research effective communication on the Project Management Institute website (  Consider the significance of communication in

A SWOT analysis categorizes an organization’s top strengths, weaknesses, opportunities, and threats into an organized list and is usually presented in a simple two-by-two grid. Tasks: From the followi

A SWOT analysis categorizes an organization’s top strengths, weaknesses, opportunities, and threats into an organized list and is usually presented in a simple two-by-two grid. Tasks: From the following list of possible corporate threats, select one (1): A disconnected, and less loyal, customer base Being leap-frogged by competitor’s technology Breach of