Information Security Management Assignments
Intrusion Detection SystemsLearning Objective: Identify and describe the types ofintrusion detection systems and the two strategies on which they are based.Assignment RequirementsQ1. Review articles that describeintrusion detection systems. (This does notincludeWikipediaor vendor's literature.)Writean introduction that describes an intrusion detection systems(IDS)for someone that is not a security professional.Describeand contrasttwoIDS. Make sure youincludeadvantages, disadvantages, life-cycle cost (which includesupdates).Write aconclusion that contains yourrecommendation of which IDS to use fora small business.Submission RequirementsFormat:Microsoft WordFont:Arial,12-Point, Double- SpaceCitationStyle: APALength:2 3 pages (plus a cover sheet)Encryption of Data at RestLearning Objective: Discuss the encryption process of dataat rest.Assignment RequirementsQ2. Write a paper that discussesencryption and how it is used to protect data at rest (i.e., storage).Introducethe concept of encryption.Describethe THREE states of data in an information processing system.Discussthe advantages and disadvantages of encrypting data at rest.Whyshould IT professionals be concerned with encrypting data?Concludewith your recommendation ofanencryption policy to yourorganization.Submission RequirementsFormat:Microsoft WordFont:Arial,12-Point, Double- SpaceCitationStyle: APALength:3 4 pages (plus a cover sheet)
THIS QUESTION IS UNSOLVED!
Request a custom answer for this question