Reference no: EM131958508
Designing Your Security Defense
You have been hired as the security professional in your current work or school environment. Your department has experienced a recent breach within its database architecture. Your manager has delegated you to lead an effort to eliminate threats within your database environment.
Based on the results that you found in your assessment, five priority threats have been identified. Define each threat identified in Hands-On Project 1-1 and indicate the policy, procedure, and design changes that need to be taken to ensure the security of your network. Ensure that your measures follow the multilayered approach to security by using the following table:
Implementing a Strategy
You have been hired as the security professional in your current work or school environment. Your department has experienced a recent breach within its database architecture. Your manager has delegated you to lead an effort to eliminate threats from the database environment. Based on the results from your assessment, five priority threats have been identified. Changes in policy, procedure, and design need to take effect in order to ensure protection from these threats. Using the five priority threats you identified in Hands-On Project 1-1, create a plan for implementation. Your plan for implementation should include the following:
The phases in which you intend to implement the project
The cost of the implementation, including a list of all new firmware and software to be purchased as well as training costs
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter Smiley: Sleeping Half Moon . Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Layer
Computer layer measures
Network layer measures
Database layer measures
Threat 1
Threat 2
Threat 3
Threat 4
Threat 5Project 1-1, create a plan for implementation. Your plan for implementation should include the following:
The phases in which you intend to implement the project
The cost of the implementation, including a list of all new firmware and software to be purchased as well as training costs