IT Systems Architecture assignment help

computer science

Description

IT Systems Architecture


You are a senior-level employee and you must tailor your deliverables to suit your audience: the

leadership of the organization. You may choose to use a fictitious organization, or model your

organization on an existing organization, including proper citations.


Leadership is not familiar with the architecture of the IT systems, nor are they familiar with the types of

threats that are likely or the security mechanisms in place to ward off those threats. You will provide this

information in tabular format.


Before you begin, review some material on information security. These resources will help you complete

the network security and vulnerability threat table.

LAN security

References

National Institute of Standards and Technology, US Department of Commerce. (1994).

Specifications for a guideline for the analysis of local area network security (Federal Information

Processing Standards Publication 191). Retrieved from http://www.nist.gov/itl/upload/fips191.pdf

Souppaya, M., & Scarfone, K., National Institute of Standards and Technology, US Department of

Commerce. (2012). Computer security: Guidelines for securing wireless local area networks

(WLANs): Recommendations of the National Institute of Standards and Technology (NIST Special

Publication 800-153). Retrieved from

http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-153.pdf

Availability

Reference

National Institute of Standards and Technology. (2004). Standards for security categorization of federal

information and information systems. Retrieved from

http://csrc.nist.gov/publications/fips/fips199/FIPS-PUB-199-final.pdf

Now you’re ready to create your table. Include and define the following components of security in the

architecture of your organization, and explain if threats to these components are likely, or unlikely:

LAN security

identity management

Instruction Files

Related Questions in computer science category