Computer Security Build

Submitted by: Submitted by

Views: 271

Words: 8828

Pages: 36

Category: Science and Technology

Date Submitted: 08/25/2013 03:17 AM

Report This Essay

Computer Security Build

Gail A. Jacob

Strayer University Online

CIS 499

Professor: Dr. Alex Lazo

April 17, 2012

Table of Content

Cover Sheet…………………………………………………………………………. 1

Executive Summary……………………………………………………………… 3

Security Policies…………………………………………………………………… 4

Information Security Policy………………………………………………….. 4-31

Basic Concept……………………………………………………………………… 31-33

Security Threats…………………………………………………………………. 34-37

Goals of Security……………………………………………………………….. 38

Virus Protection & Spyware………………………………………………… 39-41

Firewall Design & Configuration…………………………………………. 41-48

Cisco IOS Firewall Intrusion Detection System……………………. 48

Information Security Audit Check List………………………………… 49-52

B & N Corporation User Access and Rights Review……………. 52-54

Conclusion…………………………………………………………54

References……………………………………………………………………….. 55-56

Executive Summary

Computer security, also called information security involves the tools and tactics to defend against computer attacks. Organizations depend on computer systems, networks and the Internet to conduct daily business transactions and access crucial information. With the increases sophistication and the success rates in recent cyber attacks is directly related to the paradigm shift in cyber crimes, indicating that these criminal activities are well organized, highly motivated and well trained hackers. The major challenges for businesses are the complexity of security requirements due to ever changing hacking strategies, multiple security vulnerabilities, evolving business practices and new business technologies.

Computer security covers a wide area of computing and information processing, and it is vital for protecting the confidentiality, integrity, and availability of computer systems, resources, and data in all organizations. Information is an important commodity for companies, likewise is information security. Without information...