CourseLover

(12)

$10/per page/Negotiable

About CourseLover

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Algebra,Applied Sciences See all
Algebra,Applied Sciences,Architecture and Design,Art & Design,Biology,Business & Finance,Calculus,Chemistry,Engineering,Health & Medical,HR Management,Law,Marketing,Math,Physics,Psychology,Programming,Science Hide all
Teaching Since: May 2017
Last Sign in: 283 Weeks Ago
Questions Answered: 27237
Tutorials Posted: 27372

Education

  • MCS,MBA(IT), Pursuing PHD
    Devry University
    Sep-2004 - Aug-2010

Experience

  • Assistant Financial Analyst
    NatSteel Holdings Pte Ltd
    Aug-2007 - Jul-2017

Category > English Posted 09 Sep 2017 My Price 10.00

Need help to proof read and fix what I am doing wrong with my 2 outlines.

Kim, this looks good but you need to make some changes. The outline portion should resembler a table of contents, the reference section needs annotations for each reference and make sure you are using APA format for all sources. Please fix the issues and resubmit.

                                                                       Ways to secure your network

 

I. Introduction

 

Securing any network infrastructures of today is not the same as it may have been years ago. In the past some IT specialist were able to control attacks on a network because the number were reasonable however; this is not the case today. At any given time, your network could be attacked up to several hundred times in one day. Depending on your organization this number could grow significantly. To ensure your organization is not one of the ones that are subjected to the frequency of successful attacks, you have to ensure you have proper security practices in place to help keep your network secure. Best practices used for securing any network should begin with security accountability, remote access policies, proper network connected devices, behavior and acceptable use, and training.

 

II. Supporting Claim 1

 

  Security Accountability.

 

II. Supporting Claim 2

 

  Remote Access Policies

 

II. Supporting Claim 3

 

  Network Connected Devices

 

III. Supporting Claim 4

 

  Behavior and acceptable use

 

IV. Supporting Claim 5

 

  Training

 

V. Conclusion

 

In conclusion a strong security policy should be the basis for securing a network. It should detail what should be expected to keep your network secure. Your policies must be strong enough to secure your network but not so restrictive that it will impede your users from doing whatever they may need to get done. Having an effective security policy in place will always help reduce many kind of attacks that may be encountered on an unprotected network.

 

References:

 

Dubrawsky, I. (2007). How to cheat at securing your network. Burlington, MA: Syngress.

 

Gibson, D. (2010). Managing Risk in Information Systems. Sudbury, MA. Jones & Bartlett Learning.

 

Solomon, M. (2011). Security strategies in Windows platforms and applications. Sudbury, Mass.: Jones & Bartlett Learning.

 

Stallings, W. (2011). Network security essentials: Applications and standards Fourth-Edition. Upper Saddle River, NJ: Prentice Hall.

 

                                                                       Ways to secure your network

 

I. Introduction

 

The need for network security.

 

II. Supporting Claim 1

 

  Security Accountability.

 

II. Supporting Claim 2

 

  Remote Access Policies

 

II. Supporting Claim 3

 

  Network Connected Devices

 

III. Supporting Claim 4

 

  Behavior and acceptable use

 

IV. Supporting Claim 5

 

  Training

 

V. Conclusion

 

  Security policies.

 

References:

 

Dubrawsky, I. (2007). How to cheat at securing your network. Burlington, MA: Syngress.

 

Gibson, D. (2010). Managing Risk in Information Systems. Sudbury, MA. Jones & Bartlett Learning.

 

Solomon, M. (2011). Security strategies in Windows platforms and applications. Sudbury, Mass.: Jones & Bartlett Learning.

 

Stallings, W. (2011). Network security essentials: Applications and standards Fourth-Edition. Upper Saddle River, NJ: Prentice Hall.


Answers

(12)
Status NEW Posted 09 Sep 2017 07:09 AM My Price 10.00

----------- He-----------llo----------- Si-----------r/M-----------ada-----------m -----------Tha-----------nk -----------You----------- fo-----------r u-----------sin-----------g o-----------ur -----------web-----------sit-----------e a-----------nd -----------acq-----------uis-----------iti-----------on -----------of -----------my -----------pos-----------ted----------- so-----------lut-----------ion-----------. P-----------lea-----------se -----------pin-----------g m-----------e o-----------n c-----------hat----------- I -----------am -----------onl-----------ine----------- or----------- in-----------box----------- me----------- a -----------mes-----------sag-----------e I----------- wi-----------ll

Not Rated(0)