Network Security Proposal Part 2 Securing Boundary Devices, Hosts and Software

Securing Boundary Devices, Hosts, and Software – In this section, students will address each of the following. Define the physical security requirements, propose a solution, and justify the solution. At a minimum, students should discuss the three main factors of prevention, detection, and recovery; and include the appropriate control measure. Define the physical security requirements, propose a solution, and justify the solution. At a minimum, students should discuss the three main factors of prevention, detection, and recovery; and include the appropriate control measure. Define the mobile device security requirements, propose a solution, and justify the solution. Students should include smartphones, laptops, tablets, or any other mobile device that may be introduced in the UMUC environment. Students should also include the considerations and their implications. Define the perimeter defense requirements, propose a solution, and justify the solution. Students should consider the different types of attacks, security appliances, and the network configuration to implement. Define the network defense requirements, propose a solution, and justify the solution. Students should discuss common network devices, their vulnerabilities, and propose defensive solutions. Define the host defense requirements, propose a solution, and justify the solution. Students should the types of attacks hosts are susceptible to, and proposal defensive solutions.

Place Order

Don't hesitate - Save time and Excel

Assignmentsden brings you the best in custom paper writing! To get started, simply place an order and provide the details!

Place Order
Top