Examine network security of kundler networks

Assignment Help Computer Network Security
Reference no: EM13811947

Stage 1- (person 1) MY PART - Someone will need to do the benefits of risk assessments such as weigh the cost of doing risk of Kundler Shaving private chefs go to cooking displays, cost and safeguards of protecting personal shoppers info (address/contact info) used in frequent shopper program, insurance liability with chefs being customers home etc.

Stage 2- (person) - The next person will have to do evaluation of the physical security of the store to include (locks on sever rooms data and proxy card for access to sensitive information)

Stage 3- (person) - The next person will have to examine network security of Kundler networks to include routers and firewalls.

Person 4 - The last person will have to take all of the recommendations from the previous 3 stages and create a final evaluation recommendations report to include the requirements for future audit provisions the internal staff may use to validate the security measures in the system.

(Eli has chosen this portion) Person 5 - The final person will do the proofing, formatting, and submission of the paper.

Below are the requirements for the Week 5 assignment.

Develop a 3,000- to 3,500-word report for the CIO of Kudler Fine Foods.

  • This report should cover the material from the previous weeks, providing a comprehensive look at the key safeguards needed for the project at each stage of the systems development processes.
  • The report should have clear recommendations to ensure that the final frequent shopper program system is properly secured against likely threats.

Include the requirements for future audit provisions the internal staff may use to validate the security measures in the system.

Prepare a presentation to executive management at Kudler Fine Foods of the need to make the changes recommended in the paper.

  • The presentation should be 10 minutes in length.
  • The presentation must include appropriate graphics, and may be in a Microsoft PowerPoint presentation format.

Reference no: EM13811947

Questions Cloud

Discuss five issues that affect voter turnout : Discuss five issues that affect voter turnout in state and local elections.
Discuss the role of modern interest groups in politics : Discuss the role of modern interest groups in politics. When are these groups most effective. How has the role of political parties changed over the last three decades
Assignment exploring the art of indigenous cultures : Normal 0 false false false EN-US X-NONE X-NONE Exploring the Art of Indigenous Cultures:
How do the search results differ : How do the search results differ? Do you seem to be getting an unbiased listing of the best flights?
Examine network security of kundler networks : The next person will have to examine network security of Kundler networks to include routers and firewalls
What is bureaucracy : Discuss the role of modern interest groups in politics. When are these groups most effective. What is bureaucracy. Discuss purpose and problems.
Question regarding the whistle-blower definition and statute : After having reviewed the whistle-blower definition and statute, would you agree that despite having the whistle-blower statute in place, some employees are still apprehensive about coming forward with complaints? Please explain.
What is leadership style : What is Leadership Style? What type do you have and does it need changing? Can we change? When we read or talk about leadership style, it is the pattern of behavior used by a leader in attempting to influence (motivate) group members and make deci..
Explain provision protect the employer from civil lawsuits : How is the employer liable for workplace violence. Define the exclusivity provision, and analyze how this provision helps protect the employer from civil lawsuits that are associated with workplace violence

Reviews

Write a Review

Computer Network Security Questions & Answers

  What changes to the network topology or design must be made

After running for several months with a single router and a single Internet Service Provider, Netstack College wants to improve the reliability of their Internet connection. They have contracted with a second ISP so they will have two connections ..

  Design effective organization cybersecurity standards

Describe some likely instances that demonstrate when the gathering of meta-data by businesses within this example industry may not be good for the customer.

  Primary steps to database design

We explored the 2-primary steps to database design - conceptual design and physical design. We discussed importance of having representatives from all key stakeholders in conceptual design to ensure accuracy of the design.

  Cyber-terrorist crime and security breach

Large Commercial Corporation has witnessed a terrorist security breach of network, and has discovered one laptop on the scene belonging to victim.

  Why do you think functional silos are not appropriate for

1. where are erp systems heading in the future? do you agree or disagree with the trends discussed in the chapter?

  Importance of presentation and content in presentation

There has been a discussion for years on which is more important, content or presentation. This is very important when thinking about creating a PowerPoint slideshow.

  Find out the modification made to the excel spreadsheet

A dissatisfied employee that is planning to leave an organization decides to delete a file from the server. He then copied an Excel Spreadsheet into another file, modifies the new file and deletes the old file.

  Identify two competing security products

Identify two competing security products such as antivirus software, firewall, anti-spyware, or any hardware

  Recognize all the potential security threats on a personal

computer security is not an issue for organizations alone. anyone whose personal computer is connected to a network or

  Write down a 1400- to 2100-word paper which explains the

write a 1400- to 2100-word paper that describes the security authentication process.discuss how this and other

  Data security or computer-network security

The second research report should include applications of the security theories, principles, and techniques of the subject.

  Listing the pros and cons of each solution

Explain a paragraph how that can be an issue. Research U.S. Federal Regulations that govern exporting encryption technology on the Internet for more information on this topic if necessary.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd