Capella IT3358 All Units Discussions Latest 2020 January

Question

Dot Image

IT3358 Information Security Concepts for the IT Professional

Unit 1 Discussion        

Security Vulnerabilities: Policies and Controls

When developing a network security strategy, you need to make decisions on what security vulnerabilities need to be controlled in that environment. In your own words, describe how you believe vulnerabilities for global organizations differ from those that are non-local or domestic? Provide at least one (1) example supporting your stance.

 

IT3358 Information Security Concepts for the IT Professional

Unit 2 Discussion        

AAA Framework and Cryptography

The concepts of auditing, authorization, and accountability within the area of information security have helped to ease some burdens of IT security professionals relating to the control of data flow and how data and network security policies are managed. Describe the relationship between auditing, authorization, and accountability within data and network security. Additionally, describe at least one (1) tool that you believe can assist IT professionals with the security of data and networks and explain how this tool can be functional in organizations.

 

IT3358 Information Security Concepts for the IT Professional

Unit 3 Discussion        

Physical Security Controls

The assignment and readings for this week have included various physical network security controls, practices, and policies. Discuss why you believe systems and people can be (a) countermeasures, (b) vulnerabilities, and (c) threats to your physical network assets? Provide at least one (1) example on how this can be the case for each of these categories.

 

IT3358 Information Security Concepts for the IT Professional

Unit 4 Discussion        

OS and Application Vulnerability

One of the primary goals when selecting a particular technology to implement and secure an IT infrastructure is to ensure that data, operating systems, and applications are secured with competent security tools. Based on your practical experience and research on this topic, identify a vulnerability to a specific application and describe at least two (2) countermeasures or tools you would consider recommending to an organization to mitigate that vulnerability. In addition, explicate why you believe it is important for organizations to protect against this vulnerability while including the potential outcomes if this vulnerability were accepted or ignored.

 

 

IT3358 Information Security Concepts for the IT Professional

Unit 5 Discussion        

Course Reflections

Reflecting on what you have learned in this course, explain what you believe to be the most concerning security threat to organizations today and why you believe that to be the case. Additionally, assume you were implementing a security strategy for an organization that had no previous security operations; determine the first three (3) security controls you would consider implementing and explain why you believe these are the most important to commence these efforts.

Having Trouble Meeting Your Deadline?

Get your assignment on Capella IT3358 All Units Discussions Latest 2020 January completed on time. avoid delay and – ORDER NOW

Dot Image

Order Solution Now

Similar Posts