Explain network security management-flow diagram

Assignment Help Computer Network Security
Reference no: EM1367259

Network Security Management-flow diagram, assets and detail of functions (see case study MIIS after questions). I have completed the assets and flow diagrams and interfaces.

Homework Question
1. Start the systems engineering on the for MIIS, based on the prior homework assignments:

a. Decompose MIIS into the basic functions that are required: provide a brief description of each component, and put together a MIIS functional architecture diagram that shows these functions, the interfaces among the functions, and the interfaces to things outside of MIIS.
b. Create an Information Asset Inventory of all the security critical data items in MIIS. Note that these assets should be an important subset of all the IT assets.
c. For each item in the Information Asset Inventory, identify all the functions that it used in and every interface it goes over. This will help to see where each of the information assets has to be protected: the places where it is stored, and the places where it is "in transit" This is key step in the security engineering for the homework and for the project.
d. Use the set of prioritized risks from last week as the basis for a set of security requirements for MIIS. These priorities should have been based on the combination of impact and likelihood, with the most important (highest impact, highest likelihood) as the highest priority. Since the list is prioritized, you can shorten the list by eliminating the least important ones such as the low/low, low/medium, medium/low impact/likelihood risks (assuming you used at least a 3 choice scale for impact and likelihood, and low, medium are the two lowest points on the scale). Be clear, however, about which risks you are dropping. This is primarily to save work on this and the next homework. In practice, you may or may not drop the lowest priority risks.
e. Allocate these requirements to the appropriate elements of the MIIS functional architecture in part a of this homework.

Reference no: EM1367259

Questions Cloud

Explain johnson-johnson-s approach for it infrastructure : Discuss Johnson & Johnson's Approach ro providing an IT infrastructure to support its one-face-to-the-customer strategy?
Elements of power-self image and knowledge : Consider the elements of power, self-image, knowledge, and problem-solving that can serve as impediments.
Business formation codes : Explain the process for obtaining an annual filing report for a corporation currently registered in California
How fast would the police officer be travelling : A car speeds past a stationary police officer while travelling 115km/h. The officer immediately begins pursuit at a constant acceleration of 10.20 km/h/s (note the mixed units), just as the driver passes the officer.
Explain network security management-flow diagram : Network Security Management-flow diagram, assets and detail of functions. I have completed the assets and flow diagrams and interfaces. Start systems engineering on for MIIS, based on prior homework assignments:
Design simple interface hardware : Evaluate the capability in selecting and configuring a microcontroller unit designing simple interface hardware and writing subroutines to operate those interfaces
Compute number of units and unit price : Consider a market characterized by the following inverse demand and supply functions: PX = 10 - 2QX and PX = 2 + 2QX?
Health care service-quality or standards : How can we measure the fact that health care service is meeting that quality or standards, (other than surveys)? What sources of evidence do we rely?
Find out the greatest horizontal range of the rocket : A crate is sliding down a ramp that is inclined at the angle of 33° above the horizontal. The coefficient of kinetic friction between the crate and the ramp surface is 0.479. Find the acceleration of the moving crate.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd