This essay focuses on plan for improving the security posture at Sifers-Grayson. This will be documented in a Security Strategy Recommendations document. The security strategy will be based upon multiple layers of policies, processes, and technologies that, when implemented, will be used to defend the Information Technology enterprise from both internal and external threats and attacks.
plan for improving the security posture at Sifers-Grayson.
This will be documented in a Security Strategy Recommendations document.However, the security strategy will be based upon multiple layers of policies
Note: see https://www.techrepublic.com/blog/it-security/understanding-layered-security-and-defense-in-depth/ for a discussion of the differences between these two security strategies: layered security and defense-in-depth.However, You will need this information for the Security Strategies section of your paper.
Two defensive security strategies are a choice by the senior members of the team.
1.Firstly, Defense Strategy #1: Build a DMZ for the R&D Center. The DMZ will host servers accessed by the engineers while teleworking and while reaching back to the R&D center from the test range.
Demilitarized Zone (DMZ). For definitions and diagrams see https://www.us-cert.gov/ics/Control_System_Security_DMZ-Definition.html and https://fedvte.usalearning.gov/courses/Security+_v401/course/videos/pdf/Security+_v401_D02_S04_T04_STEP.pdf
2. Secondly, Defense Implement Enterprise-wide Protective and Detective Measures to defend against both internal and external attackers.Moreover,these measures and source code,
Your report will include summary information and explanations about defense in depth and the two selected strategies.
1. Firstly, an Introduction section which presents the security strategies being in recommendation in your report.
2. Secondly, a Security Strategies section in which you present an analysis of the defensive security strategies and then provide an explanation as to how each of the two selected defensive strategies will improve the security posture for Sifers-Grayson.Moreover, Include a comparison of the two primary types of strategies – layered security and defense in depth. Then, explain how the selected security strategies use one or both of these approaches.
3. Thirdly, a Product Evaluations section in which you present and discuss the technologies and products.Moreover, you must have a separate sub-section for each defense in depth strategy. Under each sub-section, you will name and describe the individual products (i.e. describe firewalls and then describe your chosen firewall product).
4.Finally, Be sure to explain the benefits of implementing the two strategies