ISSC421 Central Texas College Computer Network Security Theats Case Study

The Scenario:

After transitioning out of the military, you were contracted by a medium-sized start-up company that processes credit card transactions on a daily basis. The Chief Executive Officer (CEO) and other business staff have no knowledge of or the threats they face. They have an open position for a Chief Information Security Officer (CISO), but have yet to fill it. Thus, they hire you for your expertise in network security, firewalls, and VPN solutions.
 

This is a short term engagement  that lasts 30 days. As the company’s subject matter expert/consultant, the CEO wants a 4-6 page report at the end of your assignment.  The CEO tells you they will have remote users, so firewall and VPN technologies are needed. They provide you with the following report outline to use:

1.0 Introduction
2.0 Overview of network security fundamentals, security threats, and issues (discuss from a company wide standpoint).
3.0 Detailed network security recommendations
4.0 Summary
 

Note:

Section 3.0 should include:
 

  1. Fundamentals of firewalls and VPNs
  2. Recommendations for firewall and VPN solutions for the new company
  3. Recommendations for implementing your proposed solutions
  4. Practices that you will use to ensure security within the enterprise if they hire you long term. You may make these as sub-sections if you’d like (e.g., 3.1 Fundamentals of Firewalls and VPNs, 3.2 Recommended Firewall and VPN Solutions, etc.)

Section 4.0:

This section should be short, a paragraph or two.

Requirements:
 

  • Your submission should be 4 to 6 pages long (not including the title page and the reference page).
  • All sections are represented (Sections 1.0 – 4.0).
  • Paper is in APA format with proper citations and references.
  • 1″ margins.
  • In Times New Roman or Arial font, font size 12.
  • Utilized correct grammar and spelling.
  • Include and cite references as needed.
  • The key to this assignment is to demonstrate your understanding of the topics, not to re-word the text or reference material.
You can leave a response, or trackback from your own site.

CLICK ORDER NOW TO GET A CUSTOMIZED PAPER ON THIS TOPIC JUST FOR YOU!! 0%PLAGIARISM 100% ORIGINAL PAPER

5 Responses to “ISSC421 Central Texas College Computer Network Security Theats Case Study”

  1. Research says:

    554327 142480Normally I do not read article on blogs, but I wish to say that this write-up really forced me to try and do so! Your writing style has been surprised me. Thanks, quite good write-up. 327859

  2. 724192 648677Hello there! Do you know if they make any plugins to protect against hackers? Im kinda paranoid about losing everything Ive worked hard on. Any suggestions? 353347

  3. 192947 773520for but one more great informative post, Im a loyal reader to this weblog and I cant stress enough how considerably valuable data Ive learned from reading your content. I actually appreciate all of the hard function you put into this wonderful blog. 247214

  4. 58222 340150Maintain websiteing stuff like this I really am fond of it 929152

  5. 685398 867463I was trying to locate this. Really refreshing take on the info. Thanks a great deal. 486875

Leave a Reply

Powered by WordPress | Designed by: buy backlinks | Thanks to webdesign berlin, House Plans and voucher codes