Information Assurance

 

 

 

Once again, let us consider ABC, Inc. Answer the following question.

For access control, MAC, DAC, and RBAC are the popular options. In the context of ABC, Inc., state which of these are appropriate, with a brief justification.
ABC Inc. is trying to purchase advanced authentication servers to accommodate the increasing customer activity. The CFO (chief financial officer) prefers to go with the lowest bidder. However, the CSO (chief security officer) prefers a more systematic approach. On behalf of the CSO, write a brief note to the CFO stating the aspects that need to be taken into account in the choice. ABC Inc. has a COO and a CSO. While the COO (chief operations officer) is responsible for the overall operation of ABC Inc., the CSO (chief security officer) is responsible for the security. Both report to CEO who, in turn, reports to the Board of Directors and to the Shareholders.
Is there a need for intrusion detection in ABC Inc.? Which type(s) of products do you recommend? Justify.
Do you think the defense-in-depth is relevant for ABC, Inc.? Justify.

 

 

Information Assurance

 

 

 

Once again, let us consider ABC, Inc. Answer the following question.

For access control, MAC, DAC, and RBAC are the popular options. In the context of ABC, Inc., state which of these are appropriate, with a brief justification.
ABC Inc. is trying to purchase advanced authentication servers to accommodate the increasing customer activity. The CFO (chief financial officer) prefers to go with the lowest bidder. However, the CSO (chief security officer) prefers a more systematic approach. On behalf of the CSO, write a brief note to the CFO stating the aspects that need to be taken into account in the choice. ABC Inc. has a COO and a CSO. While the COO (chief operations officer) is responsible for the overall operation of ABC Inc., the CSO (chief security officer) is responsible for the security. Both report to CEO who, in turn, reports to the Board of Directors and to the Shareholders.
Is there a need for intrusion detection in ABC Inc.? Which type(s) of products do you recommend? Justify.
Do you think the defense-in-depth is relevant for ABC, Inc.? Justify.

 

 

Information Assurance

 

 

This course is an overview of information assurance and security topics for network administrators who must implement security strategies to protect their organization from exposure to the Internet; network designers also create security-conscious designs. Learners identify and apply strategies to guard against hackers and forms of viruses, use firewalls and gateways, and build authentication skills and encryption techniques. Learners identify methods for attacking a network system and validate defenses against them.

This course introduces information security assurance concepts and practices appropriate for beginning IT professionals whose job it is to implement security strategies that protect organizations from exposure to system threats and vulnerabilities.

Topics explore ways for IT professionals to incorporate security-conscious designs for various aspects of organizational security. Labs require you to employ strategies designed to guard against hackers and viruses, affording the opportunity for hands-on exploration of access control, authentication and encryption techniques, common methods for attacking a network system, and related topics.