Identify a layered security defense strategy


Assignment:

Daily life requires us to have access to a lot of information, and information systems help us access that information. Desktop computers, laptops, and mobile devices keep us connected to the information we need through processes that work via hardware and software components. Information systems infrastructure makes this possible. However, our easy access to communication and information also creates security and privacy risks. Laws, regulations, policies, and guidelines exist to protect information and information owners. Cybersecurity ensures the confidentiality, integrity, and availability of the information. Identity management is a fundamental practice. Part of identity management is the governance of access, authorization, and authentication of users to information systems, Identity management is one part of a layered security defense strategy within the information systems infrastructure. Your work in this project will enable you to produce a technical report and nontechnical presentation that addresses these requirements.

There are five steps that will help you create your final deliverables. The deliverables for this project are as follows:

1. Nontechnical presentation: This is an 8 to 10 slide PowerPoint presentation for business executives and board members.

2. Technical report: Your report should be a 6 to 7 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables or citations.

3. Executive summary: This should be a 2 to 3 page double-spaced Word document.

4. In a Word document, share your lab experience and provide screen prints to demonstrate that you performed the lab.

Solution Preview :

Prepared by a verified Expert
Business Law and Ethics: Identify a layered security defense strategy
Reference No:- TGS02999982

Now Priced at $120 (50% Discount)

Recommended (90%)

Rated (4.3/5)