solutions and detail the appropriate Microsoft Windows access controls including policies, standards and procedures that
define who users are, what they can do, which resources they can access, and
what operations they can perform on a system.
and detail the cryptography methods
to protect organizational information using techniques that ensure its
integrity, confidentiality, authenticity and non-repudiation, and the
recovery of encrypted information in its original form.
and devise a plan to thwart malicious
code and activity by implementing countermeasures and prevention
techniques for dealing with viruses, worms, logic bombs, Trojan horses and
other related forms of intentionally created deviant code.
4.Research and formulate a plan to implement monitoring and analysis by
determining system implementation and access as well as an incident response
plan for security breaches or events.
5.Research and detail security guidelines for contains the
two proxy servers and Internet access control for the organization
6.Research and define best practices for the security of