Describe at least three (3) threats and vulnerabilities associated to physical security.

Describe at least three (3) threats and vulnerabilities associated to physical security.

Topic: Physical Network Security Strategy

Details: For this assignment, you will complete your Physical and Network Security strategy. Each organization/company would need to show how their data, assets, and networks are protected. In this assignment, you will outline, address, and discuss your overall physical and network security strategy where you plan, design, and implement your security strategy around the organization’s global network infrastructure.

Instructions
For this week, you are to complete the following components:

Describe at least three (3) threats and vulnerabilities associated to physical security.
Define at least two (2) physical security strategies for protecting each of the following categories in the company: (a) data, (b) human resources and (c) hardware.
Describe strategies for protecting the company’s network perimeter from external threats.
Describe strategies for protecting the company’s internal and external network traffic and identify at least two (2) network security tools you would consider utilizing.
Define at least two (2) policies or guidelines that you would include in the organization’s physical security manual.
You are encouraged to provide resources and citations. Any references should be formatted according to APA (6th Edition) style and formatting.

Ensure to follow the scoring guide prior to submitting and submit your document to the assignment area.

Subject: IT3358 SECURITY CONCEPTS

Format: APA

Spacing: double spaced

Number of pages: 2

Number of sources: 2

Powerpoint Slides: 0

Deadline: 05/01/2021

Answer preview for the “Describe at least three (3) threats and vulnerabilities associated to physical security.” essay………………………..

vulnerabilities associated to physical securityapa 651 words

Click the Purchase button now to download full answer for the “Describe at least three (3) threats and vulnerabilities associated to physical security.” Page

Share this paper
Open Whatsapp chat
1
Hello;
Can we help you?