Securing Boundary Devices, Hosts, and Software


Notice: Trying to access array offset on value of type bool in /home/onliiuxo/public_html/wp-content/themes/betheme/functions/theme-functions.php on line 1490

Notice: Trying to access array offset on value of type bool in /home/onliiuxo/public_html/wp-content/themes/betheme/functions/theme-functions.php on line 1495

Securing Boundary Devices, Hosts, and Software


Notice: Trying to access array offset on value of type bool in /home/onliiuxo/public_html/wp-content/themes/betheme/functions/theme-functions.php on line 1490

Notice: Trying to access array offset on value of type bool in /home/onliiuxo/public_html/wp-content/themes/betheme/functions/theme-functions.php on line 1495

In this section, students will address each of the following. Define the physical security requirements, propose a solution, and justify the solution. At a minimum, students should discuss the three main factors of prevention, detection, and recovery; and include the appropriate control measure. Define the physical security requirements, propose a solution, and justify the solution. At a minimum, students should discuss the three main factors of prevention, detection, and recovery; and include the appropriate control measure. Define the mobile device security requirements, propose a solution, and justify the solution. Students should include smartphones, laptops, tablets, or any other mobile device that may be introduced in the UMUC environment. Students should also include the considerations and their implications. Define the perimeter defense requirements, propose a solution, and justify the solution. Students should consider the different types of attacks, security appliances, and the network configuration to implement. Define the network defense requirements, propose a solution, and justify the solution. Students should discuss common network devices, their vulnerabilities, and propose defensive solutions. Define the host defense requirements, propose a solution, and justify the solution. Students should the types of attacks hosts are susceptible to, and proposal defensive solutions.