PLEASE KNOW THAT ALL THIS WORK IS DONE AND I WILL WORK CLOSELY WITH YOU TO PUT IT TOGETHER INTO ONE VERY LARGE DOCUMENT. I AM REQUESTING YOU TO PROOFREAD ORIGINAL WORK AND MAKE GRAMMATICAL CHANGES AND

Cover Page

  1. Table of Content

  2. Baker Manufacturing: Introduction

  3. Baker Manufacturing Network Security Design

    1. Network Security –Data Centers

      1. Network Security Equipment / Tools / Software

      2. Network Security Schematic

    2. Network Security –Data Center (name of data center)

      1. Network Security Equipment / Tools / Software

      2. Network Security Schematic

  4. Baker Manufacturing Security Policy Statement

  5. Baker Manufacturing Security Education, Training and Awareness Plan

    1. Security Education Plan

      1. Program Description

      2. Targeted Personal

      3. Program Implementation Plan

      4. Program Schedules

      5. Methods of Delivery

    2. Security Training Plan

      1. Program Description

      2. Targeted Personal

      3. Program Implementation Plan

      4. Program Schedules

      5. Methods of Delivery

    3. Security Awareness Plan

      1. Program Description

      2. Targeted Personal

      3. Program Implementation Plan

      4. Program Schedules

      5. Methods of Delivery

  6. Baker Manufacturing Network Security Equipment & Tool Procedures

    1. (List each of the security equipment and tool procedures as a sub-section under this section)

  7. Baker Manufacturing Server and General Access Control Security Procedures

    1. Server Security Procedures

    2. General Access Control Security Procedures

  8. Baker Manufacturing Network Risk Assessment

  9. Baker Manufacturing Network Business Impact Analysis

  10. Baker Manufacturing Network Incident Response Plan

  11. Baker Manufacturing Network Disaster Recovery Plan

  12. Appendix:

  13. References