logo

Computer and Network Security Content

21 Pages1055 Words20 Views
   

Added on  2022-08-23

Computer and Network Security Content

   Added on 2022-08-23

ShareRelated Documents
Computer and Network
Security
Computer and Network Security Content_1
Content
Introduction
Physical Security
Network Security
Access Control
Host Security
Securing Data
Applications
Policies, Procedures and OnGoing Assessment
Expectations
Computer and Network Security Content_2
Introduction
The purpose of this presentation is to secure the computer
and network of the organization.
The aim of submitting this presentation is to win the contract
for conducting the security of the system.
The company is a manufacturing company, which manufac-
tures the medical equipment for soliciting the bids for hiring
the staffs for conducting the security and developing the IT
security policy for improving the security of the computer and
network.
Computer and Network Security Content_3
Physical Security
Risks assessment
Analysis of business impact
Work with legal department
Acceptable risks level
Baseline after setting risk level (Perlman, Kauf-
man & Speciner, 2016)
Performance level and requirement
Counter measure
Computer and Network Security Content_4
Physical Security (Contd..)
Access to the IT equipment room an the server room
must be restricted.
Warning or restriction signs need to be placed at the
entrance of those rooms (Chen et al., 2015)
The IT equipment room and server room should be
fireproof and secure.
Those rooms need to be monitored by CCTV.
The inventory of the server room or IT room need to
be up-to-dated.
Computer and Network Security Content_5
Network Security
Assets of the network
Security risks
Security tradeoffs and requirements (Acemoglu, Malekian
& Ozdaglar, 2016)
Security plans
Security policies
Process to apply the security policies
Strategy of technical implementation
Computer and Network Security Content_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security Presentation and Guidebook - IT Security
|10
|1587
|18

Network Security Issues and Security Model
|12
|664
|108

Home Network Vulnerabilities
|5
|858
|297

A Report on Network Security and Access Control TopICS
|17
|3732
|467

Law Enforcement - Cyber Security | Paper
|12
|2145
|20

Implementation of Different Firewall Technologies: Advantages and Disadvantages
|6
|2344
|50