Define the vulnerability assessment requirement, propose a solution, and justify the solution.
Define the vulnerability assessment requirement, propose a solution, and justify the solution.
· Students should review the text and example provided but do not include it with their submission. Delete the text and include you own.
· Define the security policy requirement, propose a solution, and justify the solution.
· Students should be specific when defining the overall security outlook for the organization.
· Define the risk management requirement, propose a solution, and justify the solution.
· Students should describe the process, its value to the organization, and use proper terminology.
· Define the business continuity plan requirements, propose a solution, and justify the solution.
· Student should describe the activity in detail, and include each of the plan types.
· Define the access controls requirement, propose a solution, and justify the solution.
· Students should be specific with the type of access control model they select.
Part 2:
· Define the physical security requirements, propose a solution, and justify the solution.
· At a minimum, students should discuss the three main factors of prevention, detection, and recovery; and include the appropriate control measure.
· Define the mobile device security requirements, propose a solution, and justify the solution.
· Students should include smartphones, laptops, tablets, or any other mobile device that may be introduced in the UMUC environment. Students should also include the considerations and their implications.
· Define the perimeter defense requirements, propose a solution, and justify the solution.
· Students should consider the different types of attacks, security appliances, and the network configuration to implement.
· Define the network defense requirements, propose a solution, and justify the solution.
· Students should discuss common network devices, their vulnerabilities, and propose defensive solutions.
· Define the host defense requirements, propose a solution, and justify the solution.
· Students should the types of attacks hosts are susceptible to, and proposal defensive solutions.
Part 3
· Define the public key infrastructure (PKI) requirements, propose a solution, and justify the solution.
· Students should be specific when discussing the implementation and configuration required for the PKI solution.
· Define the secure protocol implementation requirements, propose a solution, and justify the solution.
· Students should consider data as it is in transit and discuss the numerous scenarios and solutions to protect it.
· Define the file encryption requirements, propose a solution, and justify the solution.
· Students should consider data at rest and discuss the numerous scenarios and solutions to protect it.
· Define the file hashing implementation, propose a solution, and justify the solution.
· Students should consider where hashing should be implemented in the network design and explain what it provides in each instance.
· Define the backup and restoration implementation, propose a solution, and justify the solution.
· Students should explain the process, where it is applicable in the UMUC network scenario, and how it will be achieved (process, hardware, and frequency).