Physical security

Physical security

Securing Boundary Devices, Hosts, and Software

In this section, students will address each of the following.
Define the physical security requirements, propose a solution, and justify the solution.
At a minimum, students should discuss the three main factors of prevention, detection, and
recovery; and include the appropriate control measure.
Define the physical security requirements, propose a solution, and justify the solution.
At a minimum, students should discuss the three main factors of prevention,
detection, and recovery; and include the appropriate control measure.
Define the mobile device security requirements, propose a solution, and justify the
solution.
Students should include smartphones, laptops, tablets, or any other mobile
device that may be introduced in the UMUC environment. Students should also
include the considerations and their implications.
Define the perimeter defense requirements, propose a solution, and justify the
solution.
Students should consider the different types of attacks, security appliances, and
the network configuration to implement.
Define the network defense requirements, propose a solution, and justify the solution.
Students should discuss common network devices, their vulnerabilities, and
propose defensive solutions.
Define the host defense requirements, propose a solution, and justify the solution.
Students should the types of attacks hosts are susceptible to, and proposal
defensive solutions.

Project Instructions – Network Security Rubric

 

Solution preview for the order on physical security

Physical Security

APA

1691 words