Thursday, June 20, 2019
Week 5 Project #2 Research Proposal Example | Topics and Well Written Essays - 1250 words
Week 5 Project 2 - Research Proposal ExampleMalicious damage could be prevented through the example of different security checks aimed at authenticating identities of individuals utilising the arrangement. Passwords remain a common method utilise in identification of authorised individuals accessing an information systemThe system shall lie of a self assessment strategy aimed at ensuring multi-level security of the entire system. The approach adopted for the system shall occur at different layers of the system stack. The confused layers shall include the followingThese applications are implemented to monitor malicious activities within an information system platform (Whitman & Mattord, 2009). Network behaviour analysis shall be utilised in the prevention of intrusion. This kind of prevention analyses network behaviour and identifies threats through monitoring unusual activities. Statistical anomaly based detection shall be diligent in detecting threats occurring within the netw ork.Information system audit is aimed at analysing the development strategy for the information system. The auditing process shall be undertaken by a victor IT organisation to delay all aspects of the system are effectively checked. The working processes and practices must also be analysed as a way of improving the public presentation of the system.Information assurance could be defined as the application of numerous methods of providing protection for information systems, like computer networks. In providing protection of computer systems in that location are five fundamental qualities which as system must sufficiently satisfy to ensure successful protection. The five qualities are as listed belowNon-repudiation this ensures that the system maintains a record of all activities undertaken. This works in ensuring that individuals remain responsible as their actions can be retraced within the system.This refers to the process of encoding information to ensure only
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.