Discuss what you deem is the most effective security management framework for your organization and why.
part 1
There are many methods, mechanisms, and practices discussed for the management of security. Discuss what you deem is the most effective security management framework for your organization and why.
1 page apa format
3 sources
part 2
Complete a one page reflection essay on this course.
apa format 1page
Web Resources for Telecommunications & Network Security:
- Methodology of an Attack
· www.schneier.com/paper-attacktrees-ddj-ft.html
- OSI Reference Model
· http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/introint.htm#wp1020580
- Internet Protocol
· http://www.protocols.com/pbook/tcpip2.htm#IP
- IPv6
· http://www.protocols.com/pbook/tcpip2.htm#IPv6
- Threats
· http://www.fcc.gov/voip
· http://www.whitedust.net/article/30/VoIP%20Security:%20Uncovered/
· http://communication.howstuffworks.com/ip-telephony.htm
- Centralized Remote User Authentication
· http://publib.boulder.ibm.com/infocenter/pseries/v5r3/index.jsp?topic=/com.ibm.aix.security/doc/security/radius_server.htm
· http://www.untruth.org/~josh/security/radius/radius-auth.html
- Kerberos Authentication
· http://web.mit.edu/kerberous/
· http://tools.ietf.org/html/rfc1510
- Directory Services
· http://www.ehsco.com/reading/19961215ncf1.html
- Configuration Services
· http://tools.ietf.org/html/rfc2131
- Storage Data Services
· http://www.phptr.com/articles/article.asp?p=169578&rl=1
- Printing Services
· http://tools.ietf.org/html/rfc2910
· http://tools.ietf.org/html/rfc1179
· http://www.cups.org/
- Countermeasures
• http://www.dnssec.net/