Description
The system administrator duties including the monitoring the systems to ensure the secure, reliable, and authorized access.
Security methods can include:
Application hardware such as firewalls, proxy servers and DMZ
Protection methods such as intrusion detection and prevention systems
Honeypots and decoy-based intrusion-detection technology
Auditing, network monitoring, and packet analysis software such as Wireshark, SNMP
Account access control management
Complete a 2-3-page paper with an abstract and conclusion(plus cover sheet and reference page) that:
- Give an example of an application hardware, describes the use for protection with the pros and cons. Outline the type of risks you would be addressing with this protection.
- Select an example of an intrusion detection and prevention system. Give a description outlining the pros and cons. What risks would this provide protection?
- Detail the use of auditing and network monitoring and what should be observed for securing the infrastructure.
- Discuss account management and access control.
- What role do security policies provide the organization?
- What should be included in an incident response plan?
Reviews
There are no reviews yet.