Describe how the security controls are positioned


Assignment: Computer Security

It is essential as a security expert to be able to evaluate potential risks within the security infrastructure in order to position security controls/countermeasures.

a. Create an overall security architecture structure diagram with descriptions of the architecture components making sure to:

b. Identify all types of data and sensitive data the organization will store.

c. Define where that information is stored.

d. Record all hardware and software devices in your network.

e. Describe how the security controls are positioned and how they relate to the overall systems architecture.

f. Define security attacks, mechanisms, and services, and the relationships between these categories.

g. Specify when and where to apply security controls.

h. Present in-depth security control specifications.

i. Address restricting access, layering security, employing authentication, encrypting storage, automating security, and IT infrastructure.

j. Include the full scope of policy, procedural, and technical responsibilities.

Format your assignment according to the give formatting requirements:

a. The answer must be double spaced, typed, using Times New Roman font (size 12), with one-inch margins on all sides.

b. The response also includes a cover page containing the title of the assignment, the course title, the student's name, and the date. The cover page is not included in the required page length.

c. Also include a reference page. The references and Citations should follow APA format. The reference page is not included in the required page length.

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: Describe how the security controls are positioned
Reference No:- TGS03100589

Expected delivery within 24 Hours