Describe the implementation process

Assignment Help Computer Network Security
Reference no: EM132000535

In this assignment, you will continue with the report for ABC, Inc. that you started in Week 1 Project and continued in Week 2 Project and Week 3 Project.

Remember to review the scenario document for the company profile and overall security objectives. Modify and correct the plan you created for Week 3 Project to accommodate suggestions and recommendations from your instructor and your own changes based on the readings and activities for this week.

Use Track Changes or color code your changes and additions so that the changes are easy to identify. For this assignment, you will continue to work on the security report for ABC, Inc. that you worked on in Weeks 1 to 3.In this week's assignment, you will consider event logging, antivirus software, and fault tolerance as well as the steps needed to verify the security recommendations you made in prior weeks and the current week.

Using your project report from Week 3 Project, complete the following tasks by adding 2- to 3-pages to the report: Modify the plan created in W3 Assignment 2 to accommodate suggestions and recommendations from your instructor and your own changes based on the readings and activities for this week.

Color code your changes to the report so that they are easy to identify. Recommend a mechanism that will record event data on the folders for each department. What events should be logged and how often do these logs need to be reviewed? Recommend an implementation for antivirus software. Suggest a product (or products) for the organization and explain your reason for choosing that product. Recommend a mechanism for monitoring security alerts on the server.

What types of events need to be monitored and how often do the security logs need to be reviewed by a human being as opposed to an automated process? Explain your answer.

Describe the implementation process and timeline for your recommendations. Try to give as reasonable a timeline as possible and explain your plan.

Expand the section of your report for verifying the implementation of the security recommendations for this week. Identify what is being tested for each verification activity.

This should include testing activities to make sure the security system is working properly. An example of this would be using an intentionally incorrect password to make sure the system does not allow the login.

Verified Expert

This paper is the fourth section of the system security improvements for ABC, Inc. Accordingly; various recommendations have been put forth in this solution. Among these include a mechanism to record event data on the folders for each department, the best for antivirus software and a mechanism for monitoring security alerts on the server. In addition, the paper has also addressed the issue of events that require monitoring, the timeline, and an explanation of what needs to be tested for verification exercise.

Reference no: EM132000535

Questions Cloud

An example of cultural entrepreneurship : An example of cultural entrepreneurship and a brief explanation of how the person, organization, institution, initiative, etc.
Contingency graph including breakeven mas loss and gain : Draw a final contingency graph including breakeven mas loss/gain.
Identify the different communication styles among genders : Imagine your team works for the training group in human resources and is assigned to develop training for employees going abroad for a business trip.
How much revenue should portsmith recognize : Construction began on July 1, 2014, How much revenue should Portsmith recognize on its December 31, 2014, income statement
Describe the implementation process : Describe the implementation process and timeline for your recommendations. Try to give as reasonable a timeline as possible and explain your plan
What is working capital management : What is Working Capital Management? What questions is it designed to answer?
What is happening with kids in middle childhood : What's your opinion about Kohlberg's theory of moral development? What do you think about Gardner's theory of multiple intelligence?
Proprietorship-partnership forms of business organization : What are the 4 primary disadvantages of the Sole Proprietorship and Partnership forms of business organization?
Analyzing markets for high-end manufactured products : You work as a stock analyst. You specialize in analyzing markets for "high-end" manufactured products.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Was the attacker successful in penetrating the system

Was the attacker successful in penetrating the system or network? What, if anything, were they able to access or get?

  Identify the ip address of both the client and the server

Identify the IP address of both the client and the server? What port numbers have been used by each and what is their type? Briefly explain each rule in the rule base that you have created.

  Network design and analysis

You have been asked to design a Banking Network with two primary types of locations: a Branch location and a Campus location. The bank has a total of 2,220 branch locations and 85 Campus locations. What routing protocol(s) would you recommend for thi..

  What are the consequences for violation

The Policy Statement: This is a statement defining the specific action or regulation. Who is responsible for various actions? How the policy will be validated? Violations: What are the consequences for violation?

  Threats to a company intellectual property

After looking at your network security, structure there are three specific threats that we will focus on that could have a Hugh impact on your business intellectual property and integrity.

  Implement encryption and decryption of the vigenere cipher

Implement both encryption AND decryption of the Vigenere cipher with 26 English letters and 1 space character

  Identify the risk and reasoning provide a brief description

Describe the business environment and identify the risk and reasoning Provide a brief description of all the important areas of the business environment.

  Describe the security methods and controls that need

Describe the security methods and controls that need to be implemented in order to ensure compliance with these standards and regulatory requirements.

  Decision on it security investments

Discuss whether true unity is technically possible and why or why not If true unity is not technically possible, how should budgeters and policy-makers be guided to make the correct decision on IT Security investments?

  What is the single most important new technology

What is the single most important new technology that has affected digital forensics in the last five years and why?

  Fundamental security properties

List the three fundamental security properties and for each give an example of failure. Justify your answer based on literature and Explain why asynchronous I/O activity is a problem with many memory protection schemes, including base/bounds and pag..

  Discusses the possible role of encryption

Write a 5-6-page research paper that discusses the possible role of encryption in preventing the breach described in the scenario. You may take either a pro or con position.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd