
CMGT 582 Week 4 Individual Assignment Technologies & Methodologies Evaluation
Assignment Preparation: Activities include watching the SkillSoft® videos, completing the SkillSoft® course, independent student reading, and research.
Consider information management risks to include cybercrime and cyber-related crimes.
Write a 3- to 5-page evaluation of security technologies and methodologies used to mitigate information management risks. An evaluation is generally based on specific criteria and standards.
Include at least the following:
Assignment Preparation: Activities include watching the SkillSoft® videos, completing the SkillSoft® course, independent student reading, and research.
- Watch the "Creating an Actionable Risk Management Strategy" SkillSoft® video.
- Complete the "Network Security Appliances and Methods" topic of the Skillsoft® course "CompTIA Network+ 2012: Network Security Part 3."
- Complete the "Firewalls, IDS and Network Security Solutions" topic of the Skillsoft®course "CompTIA Network+ 2012: Network Security Part 3."
Consider information management risks to include cybercrime and cyber-related crimes.
Write a 3- to 5-page evaluation of security technologies and methodologies used to mitigate information management risks. An evaluation is generally based on specific criteria and standards.
Include at least the following:
- Firewalls
- Intrusion prevention systems
- Intrusion detection systems
- Access control
- Cryptographic tools and processes
Questions & Answers
Have a Question?
Be the first to ask a question about this.