Reference no: EM13910355
Task:
A. Discuss whether the new network security policies, standards, guidelines, and procedures will ensure the integrity of Softsearch's network security.
B. Analyze the attached "Softsearch Case Study" in relation to business partnering using an established risk assessment methodology for each of the following:
1. Likelihood of potential risks
2. Threats to Softsearch's network
3. Vulnerabilities to the system
C. Discuss appropriate solutions to prevent or mitigate risks from part B that could occur when Softsearch connects with its business partners.
1. Compare the features of two types of security devices from two different vendors.
2. Develop an updated network diagram of Softsearch's network infrastructure that incorporates an appropriate set of security devices from part C1.
D. Create an end-user security awareness program that includes appropriate current National Institute of Standards and Technology (NIST) principles.
1. Discuss the training methodology you would use to implement the security awareness program.
E. When you use sources, include all in-text citations and references in APA format.
Note: When bulleted points are present in the task prompt, the level of detail or support called for in the rubric refers to those bulleted points.
Note: For definitions of terms commonly used in the rubric, see the Rubric Terms web link included in the Evaluation Procedures section.
Note: When using sources to support ideas and elements in a paper or project, the submission MUST include APA formatted in-text citations with a corresponding reference list for any direct quotes or paraphrasing. It is not necessary to list sources that were consulted if they have not been quoted or paraphrased in the text of the paper or project.
Note: No more than a combined total of 30% of a submission can be directly quoted or closely paraphrased from sources, even if cited correctly. For tips on using APA style, please refer to the APA Handout web link included in the General Instructions section.