Analyze the importance of network architecture

Assignment Help Computer Network Security
Reference no: EM132391946

Question: With the description of the business environment (the fictional company that has opened in a shopping mall) in mind and your policy review and research complete, create a new security strategy in the format of a company memo (no less than three to five pages) in which you do the following:

1. Describe the business environment and identify the risk and reasoning Provide a brief description of all the important areas of the business environment that you've discovered in your research. Be sure to identify the reasons that prompted the need to create a security policy.

2. Assemble a security policy Assemble a security policy or policies for this business. Using the memo outline as a guide, collect industry-specific and quality best practices. In your own words, formulate your fictional company's security policy or policies. You may use online resources, the Strayer Library, or other industry-related resources such as the National Security Agency (NSA) and Network World. In a few brief sentences, provide specific information on how your policy will support the business' goal.

3. Develop standards Develop the standards that will describe the requirements of a given activity related to the policy. Standards are the in-depth details of the security policy or policies for a business.

4. Develop practices Develop the practices that will be used to ensure the business enforces what is stated in the security policy or policies and standards.

As an IT professional, you'll often be required to communicate policies, standards, and practices in the workplace. For this assignment, you'll practice this important task by taking on the role of an IT professional charged with creating a memo to communicate your company's new security strategy. The specific course learning outcomes associated with this assignment are:

• Analyze the importance of network architecture to security operations.

• Apply information security standards to real-world implementation.

• Communicate how problem-solving concepts are applied in a business environment.

• Use information resources to research issues in information systems security.

• Write clearly about network security topics using proper writing mechanics and business formats.

Reference no: EM132391946

Questions Cloud

Meaning and implications of statement : It is necessary for marketers to use objectives to guide their selection of relevant metrics. Discuss in detail the meaning and implications of this statement.
What tools are good to use in a strategic marketing plan : What tools are good to use in a strategic marketing plan to conduct an analysis of the furniture industry and competitors of a foreign country?
Relationship between health care organizations-communities : Explain the relationship between health care organizations and communities. Explain the importance of cultural competence for leaders in an organization.
Challenges marketers face when creating video content : What are challenges marketers face when creating video content?
Analyze the importance of network architecture : Analyze the importance of network architecture to security operations. Apply information security standards to real-world implementation.
Availability of finance affect the property sales market : Explain how interest rates and the availability of finance affect the property sales market.
Determine which type of cache memory is the most efficient : From the e-Activity, determine the type of cache memory (i.e., Level 1, Level 2, or another type) that resides on a computer that you own or on a computer.
National obesity epidemic and environmental problems : Some fast-food restaurants offer tasty and convenient food at affordable prices, but in doing so they contribute to a national obesity epidemic.
Science of marketing that every marketer should incorporate : What are some important aspects of preparing a pitch or the art and science of marketing that every marketer should incorporate?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Type of security problems computer services encounter

Students would enter the room, pick up their jobs, and leave. What kinds of security problems might computer services encounter with a system such as this?

  Discuss about the network architecture and security

Publications from the Strayer Learning Resource Center are also available. Additional resources should be used when necessary. Write a twelve to eighteen (12-18) page Security Administrator's handbook including policies tailored to your work envir..

  Who can be more sure about the sex of her unborn baby

Who can be more sure about the sex of her unborn baby, Mrs. Jones or Mrs. Smith? Justify your answer using Bayess rule.

  How to find anti-virus and firewall sw on your computer

How to find anti-virus and/or Firewall SW on your computer. Discussion on how to remove unwanted Virus and Malware?

  Conduct an audit on network security tools

Information Security Audit (COMP 0392) - The auditor should have a sufficient knowledge about the company and its critical business activities before starting an audit review. Critically analyze the part of an Information Security auditor towards ..

  Md5 hashing algorithm and an sha1 hashing algorithm

Researching your own PC's operating system, are there any tools built in to verify MD5 or SHA1 checksums of downloaded software?

  What are the four principles of computer security

What are the four principles of computer security? What are the basic principles that apply to all networks

  Identify troubleshooting tools need to manage your security

Identify troubleshooting tools needed to verify and manage your security settings. Identify at least three tools.

  Provide secure remote access solution that utilizes network

Provide secure remote access solution that utilizes Network Access Policy controls. Provide easy and manageable workstation image and software deployments. All workstations should be Window 8.

  Discuss in detail one vulnerability analysis tool

Discuss in detail one vulnerability analysis tool that is suitable for this (deployment) environment -  You have the liberty to consider open source or free products such as OpenVAS.

  Explain how you came up with your encoding and decoding

Show your work here and explain how you came up with your encoding and decoding. If you want to reverse engineer an instruction the MARS assembler shows you the encoding of all assembled instructions.

  Identify a recently announced security vulnerability

Your task is to identify a recently announced security vulnerability and write a profile of the threat. The profile should contain the name of the threat, the systems it attacks, how it performs its attack and the mitigation strategies.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd