Submitted by: Submitted by alsamp
Views: 271
Words: 8828
Pages: 36
Category: Science and Technology
Date Submitted: 08/25/2013 03:17 AM
Computer Security Build
Gail A. Jacob
Strayer University Online
CIS 499
Professor: Dr. Alex Lazo
April 17, 2012
Table of Content
Cover Sheet…………………………………………………………………………. 1
Executive Summary……………………………………………………………… 3
Security Policies…………………………………………………………………… 4
Information Security Policy………………………………………………….. 4-31
Basic Concept……………………………………………………………………… 31-33
Security Threats…………………………………………………………………. 34-37
Goals of Security……………………………………………………………….. 38
Virus Protection & Spyware………………………………………………… 39-41
Firewall Design & Configuration…………………………………………. 41-48
Cisco IOS Firewall Intrusion Detection System……………………. 48
Information Security Audit Check List………………………………… 49-52
B & N Corporation User Access and Rights Review……………. 52-54
Conclusion…………………………………………………………54
References……………………………………………………………………….. 55-56
Executive Summary
Computer security, also called information security involves the tools and tactics to defend against computer attacks. Organizations depend on computer systems, networks and the Internet to conduct daily business transactions and access crucial information. With the increases sophistication and the success rates in recent cyber attacks is directly related to the paradigm shift in cyber crimes, indicating that these criminal activities are well organized, highly motivated and well trained hackers. The major challenges for businesses are the complexity of security requirements due to ever changing hacking strategies, multiple security vulnerabilities, evolving business practices and new business technologies.
Computer security covers a wide area of computing and information processing, and it is vital for protecting the confidentiality, integrity, and availability of computer systems, resources, and data in all organizations. Information is an important commodity for companies, likewise is information security. Without information...