IT Systems Architecture
You are a senior-level employee and you must tailor your deliverables to suit your audience: the
leadership of the organization. You may choose to use a fictitious organization, or model your
organization on an existing organization, including proper citations.
Leadership is not familiar with the architecture of the IT systems, nor are they familiar with the types of
threats that are likely or the security mechanisms in place to ward off those threats. You will provide this
information in tabular format.
Before you begin, review some material on information security. These resources will help you complete
the network security and vulnerability threat table.
LAN security
References
National Institute of Standards and Technology, US Department of Commerce. (1994).
Specifications for a guideline for the analysis of local area network security (Federal Information
Processing Standards Publication 191). Retrieved from
Souppaya, M., & Scarfone, K., National Institute of Standards and Technology, US Department of
Commerce. (2012). Computer security: Guidelines for securing wireless local area networks
(WLANs): Recommendations of the National Institute of Standards and Technology (NIST Special
Publication 800-153). Retrieved from
Availability
Reference
National Institute of Standards and Technology. (2004). Standards for security categorization of federal
information and information systems. Retrieved from
Now you’re ready to create your table. Include and define the following components of security in the
the architecture of your organization, and explain if threats to these components are likely, or unlikely:
Next, review the different types of cyberattacks described in the following resource: cyberattacks. As
you’re reading take note of which attacks are most likely to affect your organization. Then list the
security defenses you employ in your organization to mitigate these types of attacks. Include this
information in your Network Security and Vulnerability Threat Table. LINK below
Johnson, C., Badger, L., Waltermire, D., Snyder, J., & Skorupka, C. (2016). Computer security: Guide to
cyber threat information sharing.(NIST Special Publication 800-150, 2nd draft). Retrieved from
Get Free Quote!
422 Experts Online