Examine network security of kundler networks

Assignment Help Computer Network Security
Reference no: EM13811947

Stage 1- (person 1) MY PART - Someone will need to do the benefits of risk assessments such as weigh the cost of doing risk of Kundler Shaving private chefs go to cooking displays, cost and safeguards of protecting personal shoppers info (address/contact info) used in frequent shopper program, insurance liability with chefs being customers home etc.

Stage 2- (person) - The next person will have to do evaluation of the physical security of the store to include (locks on sever rooms data and proxy card for access to sensitive information)

Stage 3- (person) - The next person will have to examine network security of Kundler networks to include routers and firewalls.

Person 4 - The last person will have to take all of the recommendations from the previous 3 stages and create a final evaluation recommendations report to include the requirements for future audit provisions the internal staff may use to validate the security measures in the system.

(Eli has chosen this portion) Person 5 - The final person will do the proofing, formatting, and submission of the paper.

Below are the requirements for the Week 5 assignment.

Develop a 3,000- to 3,500-word report for the CIO of Kudler Fine Foods.

  • This report should cover the material from the previous weeks, providing a comprehensive look at the key safeguards needed for the project at each stage of the systems development processes.
  • The report should have clear recommendations to ensure that the final frequent shopper program system is properly secured against likely threats.

Include the requirements for future audit provisions the internal staff may use to validate the security measures in the system.

Prepare a presentation to executive management at Kudler Fine Foods of the need to make the changes recommended in the paper.

  • The presentation should be 10 minutes in length.
  • The presentation must include appropriate graphics, and may be in a Microsoft PowerPoint presentation format.

Reference no: EM13811947

Questions Cloud

Discuss five issues that affect voter turnout : Discuss five issues that affect voter turnout in state and local elections.
Discuss the role of modern interest groups in politics : Discuss the role of modern interest groups in politics. When are these groups most effective. How has the role of political parties changed over the last three decades
Assignment exploring the art of indigenous cultures : Normal 0 false false false EN-US X-NONE X-NONE Exploring the Art of Indigenous Cultures:
How do the search results differ : How do the search results differ? Do you seem to be getting an unbiased listing of the best flights?
Examine network security of kundler networks : The next person will have to examine network security of Kundler networks to include routers and firewalls
What is bureaucracy : Discuss the role of modern interest groups in politics. When are these groups most effective. What is bureaucracy. Discuss purpose and problems.
Question regarding the whistle-blower definition and statute : After having reviewed the whistle-blower definition and statute, would you agree that despite having the whistle-blower statute in place, some employees are still apprehensive about coming forward with complaints? Please explain.
What is leadership style : What is Leadership Style? What type do you have and does it need changing? Can we change? When we read or talk about leadership style, it is the pattern of behavior used by a leader in attempting to influence (motivate) group members and make deci..
Explain provision protect the employer from civil lawsuits : How is the employer liable for workplace violence. Define the exclusivity provision, and analyze how this provision helps protect the employer from civil lawsuits that are associated with workplace violence

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd