Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.

QUESTION

Part 1: Define the vulnerability assessment requirement, propose a solution, and justify the solution. Students should review the text and example provided but do not include it with their submissi

Part 1:

  • Define the vulnerability assessment requirement, propose a solution, and justify the solution.
    • Students should review the text and example provided but do not include it with their submission. Delete the text and include you own.
  • Define the security policy requirement, propose a solution, and justify the solution.
    • Students should be specific when defining the overall security outlook for the organization.
  • Define the risk management requirement, propose a solution, and justify the solution.
    • Students should describe the process, its value to the organization, and use proper terminology.
  • Define the business continuity plan requirements, propose a solution, and justify the solution.
    • Student should describe the activity in detail, and include each of the plan types.
  • Define the access controls requirement, propose a solution, and justify the solution.
    • Students should be specific with the type of access control model they select.

Part 2: 

Define the physical security requirements, propose a solution, and justify the solution.

At a minimum, students should discuss the three main factors of prevention, detection, and recovery; and include the appropriate control measure.

  • Define the physical security requirements, propose a solution, and justify the solution.
    • At a minimum, students should discuss the three main factors of prevention, detection, and recovery; and include the appropriate control measure.
  • Define the mobile device security requirements, propose a solution, and justify the solution.
    • Students should include smartphones, laptops, tablets, or any other mobile device that may be introduced in the UMUC environment. Students should also include the considerations and their implications.
  • Define the perimeter defense requirements, propose a solution, and justify the solution.
    • Students should consider the different types of attacks, security appliances, and the network configuration to implement.
  • Define the network defense requirements, propose a solution, and justify the solution.
    • Students should discuss common network devices, their vulnerabilities, and propose defensive solutions.
  • Define the host defense requirements, propose a solution, and justify the solution.
    • Students should the types of attacks hosts are susceptible to, and proposal defensive solutions.

Part 3:

  • Define the public key infrastructure (PKI) requirements, propose a solution, and justify the solution.
    • Students should be specific when discussing the implementation and configuration required for the PKI solution.
  • Define the secure protocol implementation requirements, propose a solution, and justify the solution.
    • Students should consider data as it is in transit and discuss the numerous scenarios and solutions to protect it.
  • Define the file encryption requirements, propose a solution, and justify the solution.
    • Students should consider data at rest and discuss the numerous scenarios and solutions to protect it.
  • Define the file hashing implementation, propose a solution, and justify the solution.
    • Students should consider where hashing should be implemented in the network design and explain what it provides in each instance.
  • Define the backup and restoration implementation, propose a solution, and justify the solution.
    • Students should explain the process, where it is applicable in the UMUC network scenario, and how it will be achieved (process, hardware, and frequency).

must have headers that say  PART 1 PART 2 PART 3 

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question