IT Systems Architecture
You are a senior-level employee and you must tailor your deliverables to suit your audience: the
leadership of the organization. You may choose to use a fictitious organization, or model your
organization on an existing organization, including proper citations.
Leadership is not familiar with the architecture of the IT systems, nor are they familiar with the types of
threats that are likely or the security mechanisms in place to ward off those threats. You will provide this
information in tabular format.
Before you begin, review some material on information security. These resources will help you complete
the network security and vulnerability threat table.
National Institute of Standards and Technology, US Department of Commerce. (1994).
Specifications for a guideline for the analysis of local area network security (Federal Information
Processing Standards Publication 191). Retrieved from http://www.nist.gov/itl/upload/fips191.pdf
Souppaya, M., & Scarfone, K., National Institute of Standards and Technology, US Department of
Commerce. (2012). Computer security: Guidelines for securing wireless local area networks
(WLANs): Recommendations of the National Institute of Standards and Technology (NIST Special
Publication 800-153). Retrieved from
National Institute of Standards and Technology. (2004). Standards for security categorization of federal
information and information systems. Retrieved from
Now you’re ready to create your table. Include and define the following components of security in the
architecture of your organization, and explain if threats to these components are likely, or unlikely: