Create a memo that outlines the advantages of each approach

Assignment Help Computer Engineering
Reference no: EM131910848

Assignment

Complete Case Project 7: Read the following Case Study and answer the questions at the end in paragraph form.

Bay Pointe Security Consulting (BPSC) provides security consulting services to a wide range of businesses, individuals, schools, and organizations. BPSC has hired you as a technology student to help them with a new project and provide real-world experience to students who are interested in the security field.

Eagle Trail Real Estate is a statewide residential and commercial real estate company. Because the company was the victim of several recent attacks, Eagle Trail wants to completely change its network infrastructure. Currently the company has a small IT staff, so they have contracted with BPSC to make recommendations and install the new equipment. First, however, they have asked BPSC to give a presentation to their executive staff about network security.

Eagle Trail has been working with BPSC and is debating if they should use UTM network security appliances or separate devices (firewall, Internet content filters, NIDS, etc.). Because they appreciated your first presentation, they want your opinion on this subject. Create a memo that outlines the advantages and disadvantages of each approach, and give your recommendation.

Case Project 8-6: Read the following Case Study and answer the questions at the end in paragraph form.

Bay Pointe Security Consulting (BPSC) provides security consulting services to a wide range of businesses, individuals, schools, and organizations. BPSC has hired you as a technology student to help them with a new project and provide real-world experience to students who are interested in the security field.

Pack ‘n Go (PnG) offers to customers large portable storage units delivered to their home that the customers pack with their personal items. PnG then transports the units locally or over long distance to the end destination. Recently PnG's customer information system, which allows customers to reserve a portable storage unit, was compromised by an attacker. It appears that the attack was the result of a PnG employee's home computer that was successfully attacked and then was used to attack the PnG computers. The result was that storage units were delivered to the driveways of homes where the customers never requested them, which resulted in a large amount of unfavorable media attention. Pack ‘n Go has asked BPSC to make a presentation to the staff about securing their staff's home computers, and BPSC has asked you to help the company train its staff on the basics of host security.

After the presentation, one of PnG's IT staff has contacted you. She has been reading about DLP systems in a trade magazine and wants to know if PnG should look into purchasing a system. Create a memo to PnG's IT department about DLP, explaining what its features are and whether it would be beneficial to the company.

Reference no: EM131910848

Questions Cloud

Describe four characteristics of the lithops : Describe four characteristics of the Lithops you could use to distinguish these biotic plants from the abiotic stones they mimic.
What would be nominal and effective cost of such credit : What would be the nominal and effective cost of such a credit? Should Adams use bank debt or additional trade credit?
Escaping the immune response : Describe the unique mechanisms each of the following pathogens have for escaping the immune response
Groups of human volunteers : A biotech company ImmunX, has obtained blood samples from 2 groups of human volunteers (with their permission/consent of course).
Create a memo that outlines the advantages of each approach : Create a memo that outlines the advantages and disadvantages of each approach, and give your recommendation.
What is the probability that a surveyed voter plans : What is the probability that a surveyed voter plans to vote to reelect the mayor?
How many orders should the firm place year : Most of its sales are made in either the spring or the fall. How many orders should the firm place this year?
What is present value of all future benefits : What is the present value of all future benefits if a discount rate of 10 percent is applied?
Analyze how are topics of two articles related to the topic : Create a brief synthesis and summary of the two articles. How are the topics of the two articles related to the topic? What information was relevant and why?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd