Week 5 Security Technology: Access Controls, Firewalls, VPNs, and Intrusion Detection
Please refer to our APA Manual or visit the
Purdue Owl website at:
https://owl.english.purdue.edu/owl/resource/560/01/ for assistance with
APA formatting and style guidelines.
The
essay option requires a minimum of 850 words not including sources. Please use Grammarly to make sure it is not all run-on sentences and flows.
Include APA standards for style, citations,
references, and format. Be sure to include a title page with your name
and the name of the essay. Please refer to our APA Manual or visit the
Purdue Owl website at: https://owl.english.purdue.edu/owl/resource/560/01/ for assistance with APA formatting and style guidelines.
You must use at least
four (4) sources from professional websites or scholarly journals. Some
examples include www.sans.org, www.wired.com, www.cert.org, and www.nsa.gov.
You may not use Wikipedia, ask.com, or other related dictionary sites.
All sources must be cited within the text or mentioned within the video
presentation according to APA guidelines and must appear at the end of
your essay on a separate Reference List page or on the last page of your
Power Point presentation.
Option 2: Insider Threats
Analyze
the current state of insider threats to computer systems and
infrastructure in terms of numbers, costs and potential problems.
What are the various profiles of insiders who may compromise your systems?
What
methods can companies take to thwart insider threats? (Think of methods
such as personnel checks, monitoring access, risk management services,
suspicious activity, etc).