assignment chapter 1 vamsi

User Generated

tbjgunzz

Computer Science

Description

(RS) Assignment 1: Selecting Security Countermeasures

Assignment Requirements

You have been working as a technology associate in the information systems department at Corporation Techs for more than a month now. Your manager is very happy with your performance. The company is planning a network expansion and the challenging role you have been craving is finally here. You have been asked to be a part of the expansion plan. Your job is to review the new network design, identify the possible security threats and appropriate countermeasures. Refer to the handout to understand the current network and new additions.

Tasks

Provide a written report that should include a description of each threat and the countermeasure you identified for it. Discuss the reasons to choose those countermeasures. In addition, discuss the benefits and limitations of each countermeasure. NOTE: It would behoove you to clearly delineate the security threats and countermeasures.

Required Resources

Submission Requirements

  • Format: Microsoft Word
  • Font: Arial, Size 12, Double-Space
  • Citation Style: APA
  • Length: 2–3 pages
  • Spelling & Grammar count

Self-Assessment Checklist

  • I identified at least four security threats the network expansion poses.
  • I researched and identified the appropriate countermeasures for the identified threats.
  • I identified reasons for choosing the countermeasures.
  • I discussed the benefits and limitations of each countermeasure.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Please let me know if there is anything needs to be changed or added. I will be also appreciated that you can let me know if there is any problem or you have not received the work. Please let me know if there is anything needs to be changed or added. I will be also appreciated that you can let me know if there is any problem or you have not received the work Good luck in your study and if you need any further help in your assignments, please let me know Can you please confirm if you have received the work? Once again, thanks for allowing me to help you R MESSAGE TO STUDYPOOL NO OUTLINE IS NEEDED

Running Head: CASE STUDY ANALYSIS

1

Case study analysis
Name:
Institutional Affiliation:
Date:

2

CASE STUDY ANALYSIS
Case study analysis
Introduction

The given case study offers details on the potential dangers that the IoT gadgets pose and
present to both the individual users and the business entities. The author claims that the IoT
devices contain a variety of vulnerabilities as well as flaws that threaten the security of the home
and business networks in the context (Stanislav & Beardsley, 2015). In simple terms, the case
study speaks about the dangers or vulnerabilities and exposures that the ...


Anonymous
This is great! Exactly what I wanted.

Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Similar Content

Related Tags