For this assessment, you will complete your perimeter security strategy. Each organization or company would need to show how their data, assets, and networks are protected. In this assessment, you will outline, address, and discuss your overall physical and network security strategy where you plan, design, and implement your security strategy around the organization’s global network infrastructure. Use the suggested resources, the Capella library, and the Internet to research the subject matter.
Describe at least three threats and vulnerabilities associated with physical security.
Define at least two physical security strategies for protecting each of the following categories in the company:
Data.
Human resources.
Hardware.
Describe strategies for protecting the company’s network perimeter from external threats.
Describe strategies for protecting the company’s internal and external network traffic and identify at least two network security tools you would consider utilizing.
Define at least two policies or guidelines that you would include in the organization’s physical security manual.
You are encouraged to provide resources and citations. Any references should be formatted according to current APA style and formatting.
Additional Requirements
Use the following template: Assessment 3 format.docx
Length: Minimum of 3 pages.
Written communication: Written communication is free of errors that detract from the overall message.
APA formatting: If you use sources, ensure that resources and citations are formatted according to current APA style and formatting.
Font and font size: Times New Roman, 12 point.
Grading
Ensure you are following the scoring guide; this is how I will grade your paper:
Describe at least three threats and vulnerabilities associated with physical security.
Define at least two physical security strategies for protecting each of the following categories in the company: data, human resources, and hardware.
Describe strategies for protecting the company’s network perimeter from external threats.
Describe strategies for protecting the company’s internal and external network traffic; include at least two network security tools.
Define at least two policies or guidelines that you would include in the organization’s physical security manual.