the-attachment-include-all-the-requirements

  • Securing users and their accounts.
  • Securing storage devices.
  • Access Control Mechanism.
  • Securing network devices and other equipment’s in their network.
  • § All sections above should include proper evaluation of alternatives

  • § An effort to ensure there is standardization must be indicated in all designs.
    § Use appropriate diagrams wherever possible to illustrate your proposals.