Formulate service-level agreement to mitigate vulnerability


Assignment Problem: You've publicized the attack to your other nation teams, your team has determined that all the nation teams were under DDoS attack, and they sustained latency or even unavailability of their networks. Now the CIOs have directed that the service-level agreements (SLAs) be reviewed on what the attack means to cost and services rendered. Technologically trained professionals increase their marketability and hireability when they are able to demonstrate business acumen as well as technical expertise. And with more integrated environments following services on-demand structures such as cloud computing, it is imperative that Cybersecurity professionals be able to assess if their organization is getting what it paid for.

You may have determined a network topology for your nation team, or you may have researched a network topology and are using that to base your analysis, citing the researched information using APA format. In these topologies, you will research what are the operating system vulnerabilities (operating system fundamentals, operating system protections). You will identify requirements for operating system security to address these vulnerabilities.

You will then formulate a service-level agreement to mitigate the vulnerabilities, particularly for DDoS activities.

Produce a three- to five-page Service-Level Agreement (SLA) that you believe is best to serve the nation teams' security protections. If you research sample SLAs, provide citations.

Include:

a) An agreement not to engage in testing DDoS without notifying the Internet service provider (ISP)

b) Metrics for availability

c) Bandwidth requirements

d) Monitoring from the ISP's network

e) Traffic reports to be received and access to ISP information on net defense and best practices

f) Testing nations' teams configurations by ISP

g) Other components needed to fulfill your nation team's requirements

Perform an evaluation of the SLA that you created, and in a checklist format, report on the performance of the ISP during the DDoS attack. Conduct independent research if a checklist example is needed. If you model your checklist after an existing resource, cite and reference using APA format. Estimate costs of services or any compensation owed to the nation team. Include written justification to the ISP for the downtime due to DDoS. This evaluation is included in the three- to five-page requirement.

Your designated team member should submit the SLA for review and feedback. In the next step, you will take on "packet sniffing" in the lab, as you move to a digital forensics role in the investigation.

Tired of exploring finest Network Topology Assignment Help service that doesn't offer you desired output? Get valuable online assistance from the professionals of Tutorsglobe and boost up your academic growth.

Tags: Network Topology Assignment Help, Network Topology Homework Help, Network Topology Coursework, Network Topology Solved Assignments

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: Formulate service-level agreement to mitigate vulnerability
Reference No:- TGS03034179

Expected delivery within 24 Hours