Microsoft® Word or Excel® table Prepare a 1- to 2-page table in Microsoft® Word or a Microsoft® Excel® table in which you outline how a CISO would use the NIST publications to develop security policies. Include the following column headings: SP number SP name SP purpose Include the following row headings: SP 800-30 SP 800-34 […]
Write analysis of a particular company”s security and explain the security policies connecting to company and explain why we need to implement these policies.
Analysis and design of a company’s security by applying policies Write analysis of a particular company”s security. We will be given a packet tracer topology, We have to analyse and implement few security policies to routers or admin laptops such as firewalls, IPS, layer 2 security, Passwords if required for required devices, VPNs. You can […]
Prepare a Security Policies and Procedures Documentation on how your team would strengthen the security position of your chosen organisation.
Data and Information Security Learning Outcomes: 1. Explain security mechanisms and security services, encryption techniques, networkintrusion detection systems (NIDS) and firewalls, network security 2. Appraise security problems and threats to data and IT systems. 3. Analyze information security risks across diverse settings including the internet and WWW based commerce systems, clouds, funds transfer systems etc. […]