What is layered authentication as it relates to depth


Presentation Assignment

For this assignment, you just got promoted by Mayor of Rockdale to the Director of the Emergency Operation Center (EOC) for the City of Rockdale. The city's annual national infrastructure review is due in the next several days. Various governmental agencies including the Federal Emergency Management Agency (FEMA), Department of Homeland Security (DHS), as well as the Department of Defense (DoD) will be among the reviewing parties at your headquarters. Their primary function is to either approve or deny your city's accreditation. Without this accreditation your city will lose millions of dollars in federal grants. All other reports from your city were sent to all the reviewing agencies via electronic communication. However, the primary reason these agencies are coming to Rockdale is to listen to your presentation on how the city uses the security strategy of ‘Defense in Depth' to protect the national infrastructures located in Rockdale. Your presentation will include the following:

• What is Defense Depth?
• What is the effectiveness of Depth?
• What is layered Authentication as it relates to Depth?
• What is a layered defense as it relates to Depth?
• Explain multi-layered protection as it relates to the five steps to remote email access
• What is layered access control?
• What is layered encryption?
• What are the Five (5) encryption methods for national infrastructure protection?
• What is Layered intrusion detection?
• Explain national program of Depth
• How do all these different Depth strategies work in unison to protect the national infrastructures in Rockdale?

Format your assignment according to the following formatting requirements:

1. The answer should be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

2. The response also includes a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.

3. Also include a reference page. The Citations and references should follow APA format. The reference page is not included in the required page length.

Solution Preview :

Prepared by a verified Expert
Management Information Sys: What is layered authentication as it relates to depth
Reference No:- TGS02995568

Now Priced at $50 (50% Discount)

Recommended (96%)

Rated (4.8/5)