IT infrastructure of an enterprise has:
- Database servers, storage systems (SAN & NAS) for data storage
- Computers, applications to process the data
- Network components to enable connectivity among computers and servers
In this research, your goal is to secure the data processed by these IT components. You will:
- Research and analyze potential vulnerabilities and security challenges that are associated with these IT components and that eventually threatens confidentiality, integrity, and availability of data. Consider both the technical and non-technical vulnerabilities.
- Research and analyze various security countermeasures and solutions to secure data. Think about countermeasures in policy, human, database, application, computer, storage, server, network, data, object, and application dimensions.
Action Items
- Download and read the directions for this assignment, .
- Conduct your research as described in the directions.
- Write a 2-3 page APA-formatted research paper.
- Submit your assignment. Your work will automatically be checked by Turnitin.
- Review your Submission Details and access your Turnitin report. Revise your work as needed based on the feedback.
- By the due date indicated, re-submit the final version of your work.