Security assessment for countermeasures and mitigation


Assignment:

Security Assessment for Countermeasures and Mitigation

Final Project Paper

Deliverables

The deliverables for your Project Paper Assignment includes a Word document that answers the questions described below. Your final paper should be between 10 to 15 pages long. Be sure the report is in MS Word, Arial 12-pt font, with double spacing and 1 inch margins all-around, no additional spaces allowed. Cover page and references pages are also requird. The

Company Z provides telephony services to customers. These services include VoIP. You are hired to create a security assessment for company Z for an upcoming audit by the counties authoritative agents to certify company Z compliant to ISO 17799 Standard for The professional Practices for the Business Continuity Planner. In this security assessment you are asked to conduct a complete

a) network security threat assessment

b) network security vulnerability assessment

c) risk assessment

d) countermeasures and mitigation

e) the last part of your work will include your personal experiences and what you have learned in this class reflected towards securing your system's network

You may use web resources as references, however make sure to include all your resources and cite from them with author, year of publication, and the corresponding page or paragraph numbers.

This project is base on a home net work that was made two years ago. The initial part of the service was base on the two desk tops and a printer. The task began with having an ISP which was conducted on research on the service offer in my local area. I use equipment furnish by Att, and the set up procedure.

Att furnished a modem, router, and adaptors for the phone line, additions Ethernet cords. I had to buy a wireless card for one of the desk tops. Since setting up this network I have also added four laptops and an addition printer.

The network was set up with basic directions with hooking up the model. I also had to place the adaptors on the home phone lines and the line leading into the model. Once having the equipment set up I did the software hook on and then ensure that everything was in place.

The reason for putting together my own home network was for one the other desk top was in another room and I did not want to run a cord all over the home to the router. Second, which is a benefit to have the network was that we have access to all of the files from both computers. Also my wife's desk, called that as she was the primary user of that desk top and she used it for her home day care was that she printed a lot of material for her computer.

Solution Preview :

Prepared by a verified Expert
Computer Network Security: Security assessment for countermeasures and mitigation
Reference No:- TGS01935365

Now Priced at $20 (50% Discount)

Recommended (93%)

Rated (4.5/5)