Companys needs for these types of security

Assignment Help Computer Network Security
Reference no: EM13854045

Your company is bought out by another company and there were massive layoffs. Your manager was one of the casualties. In the reorganization, your department was moved to the new parent company which means new coworkers and more importantly, a new boss as part of a new publishing company with 300 employees over 4 sites. Your new manager visited your new desk as you were unpacking your stapler and announced that you were the person with the most experience so they needed you to give a presentation to the other department managers on the need for physical security and adequately configuring your company's network to be secure. Since you don't have a list of equipment, you have a little leeway on what your presentation will include in that respect, however, for details on physical security, you have to make sure you include the basics. Make sure you detail what will deter hackers from breaking in. Be sure to include your references.

Submit a PowerPoint presentation with 8-10 (or more) slides that outlines your company's needs for these types of security, how it should be used, and how it is to be structured.

Attach the PowerPoint presentation to this assignment link. This assignment should adhere to the minimums for slide countand is due at the end of the academic week. It is worth 50 points, and a good presentation of the topic will get full credit. Ensure you're using standard formatting for presentations and that you cite and reference any sources used. Any misspellings or grammar issues will result in deductions from the total score. This assignment's score will appear in theonline grade book following the end academic week.

Research Paper Assignment - Milestone 2 - Abstract (Attach the Abstract to this Assignment)

The Research Paper abstract is due this week. Make sure you have read through the Research Paper Overview in the Research Paper folder. Submit the abstract in a single Word document by attaching it to this assignment using the link provided.


Attachment:- security.docx

Verified Expert

Reference no: EM13854045

Questions Cloud

Real return to capital in the export industry also decreases : "In a 2x2x2 Heckscher-Ohlin context, when a relatively labor-abundant country moves from autarky to trade, the real return to capital in the import-competing industry decreases and the real return to capital in the export industry also decreases."
Outline your findings on ethical standard for a corporation : Outline your findings on the ethical standard for a corporation's financial and tax reporting. State specific examples of the ethical standards and laws that you are following as the tax and financial analyst.
Is this hypocritical on the part of the government : What positive, or negative, effects on society can you identify? Is this hypocritical on the part of the government? Explain how it is, or is not, hypocritical
Banking system leads to an increase in the fed funds rate : Which of the following is a rate that should theoretically serve as a floor for the Fed funds rate? If a security dealer "repos securities," they are a.  An increase in the supply of reserves in the banking system leads to an increase in the Fed fund..
Companys needs for these types of security : Details on physical security, you have to make sure you include the basics. Make sure you detail what will deter hackers from breaking in. Be sure to include your references -
What and how much are the store owners implicit costs : The owner/manager of an athletic shoe store has revenue of $260,000 per year and labor, interest, inventory, and miscellaneous expenses of $200,000. The owner also owns the building the store is located in. It would rent out for $5,000 annually. What..
Geometric gradient series of cash flows : The future worth in year 10 of a geometric gradient series of cash flows was found to be $80,000. If the interest rate was 15% per year and the annual rate of increase was 9% per year, what was the cash flow amount in year 1?
What is the difference between an argument and a quarrel : What is the difference between an argument and a quarrel. You have probably never had to persuade someone to do anything.
How many streetlights are socially optimal : Suppose Chen has demand Q = 40 – 2P for streetlights and Abby has the demand Q = 10 – (1/2)P for streetlights. The cost of building each streetlight is $19. How many streetlights are socially optimal? Compare this socially optimal quantity with the q..

Reviews

Write a Review

Computer Network Security Questions & Answers

  What should be minimum key size increase to meet objective

Considering the continuous increase in computer speed, the company decided to increase the size of the encryption key so that the time to break the encryption become more than 250 hours. What should be the minimum key size increase to meet this ob..

  Information security standards for an organization

Every organization must consider the mandatory and recommended practices when creating its information security program and/or security policies.

  Why change the default administrator login and password

what are some of the important measures you can take to ensure that your home wireless network is safe and secure. Change the default administrator login and password. Use something only you will remember.

  Advantage and disadvantage of key diversi?cation

Sally generates key KA when required as KA = h(Alice,KS ),with keys KB and KC generated in similar manner. Explain one advantage and one disadvantage of key diversi?cation.

  Discuss the role they play in computer crime

Discussing the role they play in computer crime. Be sure to research and document cases to support each law and your discussion

  Security through obscurity in a computer situation

Give an example of security through obscurity in a computer situation. Give an example of security through obscurity in a situation not involving computers. Is security through obscurity an effective countermeasure in either example?

  How system derive secret key for des from user-s password

Known risks of the UNIX password system, it has been recommended that the system be replaced by an alternative system that uses public key cryptography, RSA for example. How might the system derive the secret key for DES from the user's login pas..

  Determine plaintext and key from vigenere cipher

Below are ciphertext from Vigenere cipher. Determine plaintext and key. Give a clearly written description of steps you followed to decrypt each ciphertext.

  Social engineering attacks and counterintelligence

Social Engineering Attacks and Counterintelligence

  Fundamental security properties

List the three fundamental security properties and for each give an example of failure. Justify your answer based on literature and Explain why asynchronous I/O activity is a problem with many memory protection schemes, including base/bounds and pag..

  Sarbanes-oxley act

Provide an overview that will be delivered to senior management of regulatory requirements the agency needs to be aware of, including: Sarbanes-Oxley Act

  Define security infrastructure and protocols

The SSL protocol uses (X.509) certificates to create a secure session between a server and a client in a web session. Discuss the browser-based trust model assumed in SSL, and compare it with the trust model used in Kerberos.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd