Reference no: EM13714419
Answer edwin_1985 question on · Nov 06, 2014 at 12:07pm. Can you please help me with the similar project? I need a power point presentation.
Prepare presentation slides on the security solution you would recommend. Show why your solution provides the best level of security. Assess the cost and the required resources of your solution.
================================
Several computers in your company have recently been compromised. It was discovered that your company network had been under attack for several months. However, these attacks had not been previously detected. The attackers exploited both network and host vulnerabilities.
The head of your company decides that security needs to be enhanced. The company network should be modified to prevent a majority of further attacks. Attacks that cannot be prevented should be at least detected. However, solutions for tolerating undetected attacks should also be envisioned. The head of the company charges you to come up with a plan. A rough estimate of the maximum cost of this task is: $500K for equipment and software and at least 1 full-time security administrator. However, the head of your company indicates that these numbers could change based on your proposal. Your goal is to propose the best plan that would provide the best level of security for adequate cost and resources.
The company already has a network of Linux computers for scientific research and a network of Windows computers for administrative tasks. Moreover, the company relies on its web server to advertise and sell some of its products. Both networks should be made more secure. Both networks should also be able to securely communicate.
Prepare presentation slides on the security solution you would recommend. Show why your solution provides the best level of security. Assess the cost and the required resources of your solution.
Explain how the maxflow algorithm works
: Explain how the maxflow algorithm works, elaborating on all cases and transitions that need to be considered during execution.
|
Identify the java-based technologies utilized
: Five hundred words discussion paper. Identify the Java-based technologies utilized in this project and analyze each of them. Then, provide discussion on the purpose of each of the Java-based technologies utilized.
|
Mainframes are perceived as being more robust
: QUESTION 1 Mainframes are perceived as being more robust than n-tier server architectures. True False
|
Compare and contrast physical access controls
: Compare and contrast physical access controls and logical access controls. Further explain in what ways both physical and logical access controls are related to implementing a security policy.
|
Exploited both network and host vulnerabilities
: Several computers in your company have recently been compromised. It was discovered that your company network had been under attack for several months. However, these attacks had not been previously detected. The attackers exploited both netwo..
|
The term means making an organization ready
: QUESTION 1 The term means making an organization ready for possible contingencies that can escalate to become disasters.QUESTION 2 Mainframes are perceived as being more robust than n-tier server architectures.
|
Analysis summarizing the wireless design
: Provide a 7 to 10 page analysis summarizing the wireless design to the executive management team. The summary should effectively allow the senior management to understand the organization security requirements and make the appropriate decisions..
|
Determine the activation energy in kj
: Determine the activation energy in kJ/mol for a first order reaction if its specific rate constant 5.90e-05 s-1 at 400. K and 4.06e+02 s-1 at 600. K.
|
Tungsten with a mass numer of 185 and atomic number of 74
: Tungsten with a mass numer of 185 and atomic number of 74, decays by beta emissions. Identify the product of the nuclear reaction by its atomic symboll, mass number and atomic number?".'
|