Need help to proof read and fix what I am doing wrong with my 2 outlines.

Nov 8th, 2015
RockCafe
Category:
Writing
Price: $15 USD

Question description

Kim, this looks good but you need to make some changes. The outline portion should resembler a table of contents, the reference section needs annotations for each reference and make sure you are using APA format for all sources. Please fix the issues and resubmit.

                                                                       Ways to secure your network

I. Introduction

Securing any network infrastructures of today is not the same as it may have been years ago. In the past some IT specialist were able to control attacks on a network because the number were reasonable however; this is not the case today. At any given time, your network could be attacked up to several hundred times in one day. Depending on your organization this number could grow significantly. To ensure your organization is not one of the ones that are subjected to the frequency of successful attacks, you have to ensure you have proper security practices in place to help keep your network secure. Best practices used for securing any network should begin with security accountability, remote access policies, proper network connected devices, behavior and acceptable use, and training.

II. Supporting Claim 1

  Security Accountability.

II. Supporting Claim 2

  Remote Access Policies

II. Supporting Claim 3

  Network Connected Devices

III. Supporting Claim 4

  Behavior and acceptable use

IV. Supporting Claim 5

  Training

V. Conclusion

In conclusion a strong security policy should be the basis for securing a network. It should detail what should be expected to keep your network secure. Your policies must be strong enough to secure your network but not so restrictive that it will impede your users from doing whatever they may need to get done. Having an effective security policy in place will always help reduce many kind of attacks that may be encountered on an unprotected network.

References:

Dubrawsky, I. (2007). How to cheat at securing your network. Burlington, MA: Syngress.

Gibson, D. (2010). Managing Risk in Information Systems. Sudbury, MA. Jones & Bartlett Learning.

Solomon, M. (2011). Security strategies in Windows platforms and applications. Sudbury, Mass.: Jones & Bartlett Learning.

Stallings, W. (2011). Network security essentials: Applications and standards Fourth-Edition. Upper Saddle River, NJ: Prentice Hall.


                                                                       Ways to secure your network

I. Introduction

The need for network security.

II. Supporting Claim 1

  Security Accountability.

II. Supporting Claim 2

  Remote Access Policies

II. Supporting Claim 3

  Network Connected Devices

III. Supporting Claim 4

  Behavior and acceptable use

IV. Supporting Claim 5

  Training

V. Conclusion

  Security policies.

References:

Dubrawsky, I. (2007). How to cheat at securing your network. Burlington, MA: Syngress.

Gibson, D. (2010). Managing Risk in Information Systems. Sudbury, MA. Jones & Bartlett Learning.

Solomon, M. (2011). Security strategies in Windows platforms and applications. Sudbury, Mass.: Jones & Bartlett Learning.

Stallings, W. (2011). Network security essentials: Applications and standards Fourth-Edition. Upper Saddle River, NJ: Prentice Hall.



Tutor Answer

(Top Tutor) Daniel C.
(997)
School: New York University
PREMIUM TUTOR

Studypool has helped 1,244,100 students

3 Reviews


Summary
Quality
Communication
On Time
Value
BlueOcean
Nov 15th, 2016
" Awesome! Exactly what I wanted. "
ashleyisgod
Oct 24th, 2016
" Top quality work from this guy! I'll be back! "
Molly_Moon
Oct 1st, 2016
" AMAZING as always! "
Ask your homework questions. Receive quality answers!

Type your question here (or upload an image)

1825 tutors are online

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors