Article Writing Homework Help
Part 1: Define the vulnerability assessment requirement, propose a solution, and justify the solution. Students should review the text and example provided but do not include it with their submissi
Part 1:
Get Your Custom Essay Written From Scratch
We have worked on a similar problem. If you need help click order now button and submit your assignment instructions.
Just from $13/Page
- Define the vulnerability assessment requirement, propose a solution, and justify the solution.
- Students should review the text and example provided but do not include it with their submission. Delete the text and include you own.
- Define the security policy requirement, propose a solution, and justify the solution.
- Students should be specific when defining the overall security outlook for the organization.
- Define the risk management requirement, propose a solution, and justify the solution.
- Students should describe the process, its value to the organization, and use proper terminology.
- Define the business continuity plan requirements, propose a solution, and justify the solution.
- Student should describe the activity in detail, and include each of the plan types.
- Define the access controls requirement, propose a solution, and justify the solution.
- Students should be specific with the type of access control model they select.
Part 2:
Define the physical security requirements, propose a solution, and justify the solution.
At a minimum, students should discuss the three main factors of prevention, detection, and recovery; and include the appropriate control measure.
- Define the physical security requirements, propose a solution, and justify the solution.
- At a minimum, students should discuss the three main factors of prevention, detection, and recovery; and include the appropriate control measure.
- Define the mobile device security requirements, propose a solution, and justify the solution.
- Students should include smartphones, laptops, tablets, or any other mobile device that may be introduced in the UMUC environment. Students should also include the considerations and their implications.
- Define the perimeter defense requirements, propose a solution, and justify the solution.
- Students should consider the different types of attacks, security appliances, and the network configuration to implement.
- Define the network defense requirements, propose a solution, and justify the solution.
- Students should discuss common network devices, their vulnerabilities, and propose defensive solutions.
- Define the host defense requirements, propose a solution, and justify the solution.
- Students should the types of attacks hosts are susceptible to, and proposal defensive solutions.
Part 3:
- Define the public key infrastructure (PKI) requirements, propose a solution, and justify the solution.
- Students should be specific when discussing the implementation and configuration required for the PKI solution.
- Define the secure protocol implementation requirements, propose a solution, and justify the solution.
- Students should consider data as it is in transit and discuss the numerous scenarios and solutions to protect it.
- Define the file encryption requirements, propose a solution, and justify the solution.
- Students should consider data at rest and discuss the numerous scenarios and solutions to protect it.
- Define the file hashing implementation, propose a solution, and justify the solution.
- Students should consider where hashing should be implemented in the network design and explain what it provides in each instance.
- Define the backup and restoration implementation, propose a solution, and justify the solution.
- Students should explain the process, where it is applicable in the UMUC network scenario, and how it will be achieved (process, hardware, and frequency).
must have headers that say PART 1 PART 2 PART 3