Discuss what you deem is the most effective security management framework for your organization and why.

part 1

There are many methods, mechanisms, and practices discussed for the management of security. Discuss what you deem is the most effective security management framework for your organization and why.

1 page apa format

3 sources

part 2

Complete a one page reflection essay on this course.

apa format 1page

Web Resources for Telecommunications & Network Security:

  1. Methodology of an Attack

· www.schneier.com/paper-attacktrees-ddj-ft.html

  1. OSI Reference Model

· http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/introint.htm#wp1020580

  1. Internet Protocol

· http://www.protocols.com/pbook/tcpip2.htm#IP

  1. IPv6

· http://www.protocols.com/pbook/tcpip2.htm#IPv6

  1. Threats

· http://www.fcc.gov/voip

· http://www.whitedust.net/article/30/VoIP%20Security:%20Uncovered/

· http://communication.howstuffworks.com/ip-telephony.htm

  1. Centralized Remote User Authentication

· http://publib.boulder.ibm.com/infocenter/pseries/v5r3/index.jsp?topic=/com.ibm.aix.security/doc/security/radius_server.htm

· http://www.untruth.org/~josh/security/radius/radius-auth.html

  1. Kerberos Authentication

· http://web.mit.edu/kerberous/

· http://tools.ietf.org/html/rfc1510

  1. Directory Services

· http://www.ehsco.com/reading/19961215ncf1.html

  1. Configuration Services

· http://tools.ietf.org/html/rfc2131

  1. Storage Data Services

· http://www.phptr.com/articles/article.asp?p=169578&rl=1

  1. Printing Services

· http://tools.ietf.org/html/rfc2910

· http://tools.ietf.org/html/rfc1179

· http://www.cups.org/

  1. Countermeasures

• http://www.dnssec.net/