Need help to proof read and fix what I am doing wrong with my 2 outlines.

User Generated

XVATPBALREF

Writing

Description

Kim, this looks good but you need to make some changes. The outline portion should resembler a table of contents, the reference section needs annotations for each reference and make sure you are using APA format for all sources. Please fix the issues and resubmit.

                                                                       Ways to secure your network

I. Introduction

Securing any network infrastructures of today is not the same as it may have been years ago. In the past some IT specialist were able to control attacks on a network because the number were reasonable however; this is not the case today. At any given time, your network could be attacked up to several hundred times in one day. Depending on your organization this number could grow significantly. To ensure your organization is not one of the ones that are subjected to the frequency of successful attacks, you have to ensure you have proper security practices in place to help keep your network secure. Best practices used for securing any network should begin with security accountability, remote access policies, proper network connected devices, behavior and acceptable use, and training.

II. Supporting Claim 1

  Security Accountability.

II. Supporting Claim 2

  Remote Access Policies

II. Supporting Claim 3

  Network Connected Devices

III. Supporting Claim 4

  Behavior and acceptable use

IV. Supporting Claim 5

  Training

V. Conclusion

In conclusion a strong security policy should be the basis for securing a network. It should detail what should be expected to keep your network secure. Your policies must be strong enough to secure your network but not so restrictive that it will impede your users from doing whatever they may need to get done. Having an effective security policy in place will always help reduce many kind of attacks that may be encountered on an unprotected network.

References:

Dubrawsky, I. (2007). How to cheat at securing your network. Burlington, MA: Syngress.

Gibson, D. (2010). Managing Risk in Information Systems. Sudbury, MA. Jones & Bartlett Learning.

Solomon, M. (2011). Security strategies in Windows platforms and applications. Sudbury, Mass.: Jones & Bartlett Learning.

Stallings, W. (2011). Network security essentials: Applications and standards Fourth-Edition. Upper Saddle River, NJ: Prentice Hall.


                                                                       Ways to secure your network

I. Introduction

The need for network security.

II. Supporting Claim 1

  Security Accountability.

II. Supporting Claim 2

  Remote Access Policies

II. Supporting Claim 3

  Network Connected Devices

III. Supporting Claim 4

  Behavior and acceptable use

IV. Supporting Claim 5

  Training

V. Conclusion

  Security policies.

References:

Dubrawsky, I. (2007). How to cheat at securing your network. Burlington, MA: Syngress.

Gibson, D. (2010). Managing Risk in Information Systems. Sudbury, MA. Jones & Bartlett Learning.

Solomon, M. (2011). Security strategies in Windows platforms and applications. Sudbury, Mass.: Jones & Bartlett Learning.

Stallings, W. (2011). Network security essentials: Applications and standards Fourth-Edition. Upper Saddle River, NJ: Prentice Hall.



User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer


Anonymous
Great content here. Definitely a returning customer.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags