Create an outline of a multilayered security strategy

Assignment Help Other Subject
Reference no: EM133208802

Assignment - Cyber Security Essay

Description - CYB-: Risk Management and Information Technology Security

Multi-Layered Security Plan - The components that make up cyberspace are not automatically secure. This includes cabling, physical networks, operating systems, and software applications that computers use to connect to the Internet. There is a raging information security war. The goal is to protect systems, applications, and business information. Therefore, IT is in great need of proper security controls.

For this project, you will create an outline of a multilayered security strategy for a fictitious financial organization, and then identify security challenges and suggest proper security controls for the company's information systems environment. This project provides you an opportunity to apply the competencies gained in various lessons of this course to identify security challenges and apply strategies of countermeasures for information systems.

Upon successful completion of this assignment, you will be able to:

Understand information systems security (ISS) fundamentals including the definition of terms, concepts, elements, and goals.

Understand the purpose of a multilayered security strategy.

Incorporate industry standards and practices with a focus on the confidentiality, integrity, availability, and vulnerabilities of information systems.

Fulfill the role of a security professional implementing proper security controls in a specific business situation.

Resources - Textbook: Principles of Information Security (Chapters 6-10)

Background Information - Scenario: - You are a network security specialist at Richman Investments, a mid-level financial investment and consulting firm. The Richman corporate headquarters is located in Phoenix, Arizona. Currently, there are eight branch offices in:

Atlanta, Georgia

Chicago, Illinois

Cincinnati, Ohio

Denver, Colorado

Los Angeles, California

Montreal, Canada

New York City, New York

Washington, D.C.

You received an e-mail from your supervisor stating that you need to create an outline of the general security solutions planned for the safety of data and information that belongs to the organization. You are told that every month, the networking division needs to submit a report to the senior management about the security plan for the month, and your outline will become a part of that report.

You need to research the elements of a multilayered security plan and to create a detailed outline. Your outline should indicate one or more general security solutions for each of the seven domains of a typical IT infrastructure.

Reference no: EM133208802

Questions Cloud

How can deal with change using lewins model : Discuss how managers can deal with change using Lewin's model and all the issues managers may have to address within the organization.
How a big impact on society in terms of the environment : How companies act has a big impact on society in terms of the environment and the economy.
What is starbucks right with respect to leading function : What is Starbucks doing right with respect to the leading function? Are they doing mything wrong? Explain.
Review the video on most common types of cyber attacks : Review the video on 8 most common types of cyber attacks: Submit a 2 page document highlighting each type of cyber attack with examples
Create an outline of a multilayered security strategy : For this project, you will create an outline of a multilayered security strategy for a fictitious financial organization, and then identify security challenges
Discuss risk minimisation strategies : Belinda would like to be involved in decisions around each of the strategies and may have some ideas of her own that will require strategies to be changed.
What role does the Affordable Care Act play : Nursing Discussion - What role does the Affordable Care Act (ACA) play in addressing workforce shortages in rural communities
How does sara display transformational leadership qualities : Throughout this episode, how does Sara display transformational leadership qualities, not just with Paula, but her entire team
What led to cloud computing popularity : What led to cloud computing's popularity? Why should small businesses embrace cloud computing and adopt cloud-based information technology services

Reviews

Write a Review

Other Subject Questions & Answers

  Identify and describe workplace violence in healthcare

Identify and briefly describe Workplace violence in healthcare. Identify the four research databases that you used to conduct your search for the peer-reviewed.

  What the professional responsibility of genetic counseling

Life-span development psychology question: What is the professional responsibility of genetic counseling? What are some of the difficulties genetic counseling faces

  The last five years on patient safety and the quality care

Create a Power Point Presentation that reviews four articles written in the last five years on patient safety and the quality of patient care.

  Write a value from memory

Show the contents of all CPU Registers; IR, PC, MAR, MDR, and AC. You need to provide all steps that reach you the final values.

  How is the american and canadian legal system similar

Name the judges of the Court of Appeals for the district of your residence. In your answer, please be sure to include the district.

  Ethics Issue- Virtue Ethics

Martha is the administrative assistant to Valerie, the practice manager in a five-physician practice. Salaries of staff are confidential.

  Healthy perspective of quality management

Does the phrase"quality is the responsibility of the quality department" reflect a healthy perspective of quality management? Explain your answer.

  What is the book about as a whole

Based on your reading of chapters 1-11 of Adler's how to read a book book, answer what Adler calls "the four main questions you must ask about any book":

  This new marketing role that is needed in marketing for

to successfully facilitate the shift in focus to the designing of health care for populations a shift in marketing

  Explain our vision for your career once you have completed

Describe your vision for your career once you have completed your master's degree. Address the impact completing this degree will have on meeting the greater social good in your industry and within the community.

  What is the surface temperature of the heater

A cylindrical electric resistance heater has a diameter of 1cm and length of 0.25m. When water at 30oC flows across the heater a heat-transfer coefficient of 15W/(m2 . oC) exists at the surface.

  What are the strategies to produce green software

What is sustainable computing? Why do you need computing to be sustainable and What are the strategies to produce green software

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd