Discipline: Computer Science

Chapter 12Chapter 12

Provide your thoughts and understanding of requirements: 1. Who consumes requirements? 2. Getting security requirements implemented. 3. Why do good requirements go bad? Answer the questions with an APA-formatted paper (Title page, body and references only).  Your response should have a minimum of 500 words. 

Computer Science 4-3 Lab: Securing the pfSense Firewall: Information Security Fundamentals AssignmentComputer Science 4-3 Lab: Securing the pfSense Firewall: Information Security Fundamentals Assignment

Log in to InfoSec to complete the labs below and take screenshots at the steps below: Testing The Firewall From The External Network – Step 6 – Output from Zenmap Closing Unnecessary Ports On The Pfsense Firewall – Step 6 – Challenge #3 Complete Closing Unnecessary Ports On The Pfsense Firewall – Step 8 – Challenge […]

Computer Science 4-2 Lab: Configuring a Linux-Based Firewall to Allow Ingoing and Outgoing Traffic: Information Security Fundamentals AssignmentComputer Science 4-2 Lab: Configuring a Linux-Based Firewall to Allow Ingoing and Outgoing Traffic: Information Security Fundamentals Assignment

Log in to InfoSec to complete the labs below and take screenshots at the steps below: Configuring and Testing the Linux-Based Firewall – Step 22 – Checking Outbound FTP Configuring and Testing the Linux-Based Firewall – Step 33 – Display of Current Rules Configuring and Testing the Linux-Based Firewall – Step 34 – Results of NMAP […]

Computer Science 4-4 Draft of Training Manual Section Two: Firewall Configuration AssignmentComputer Science 4-4 Draft of Training Manual Section Two: Firewall Configuration Assignment

Firewall Configuration Overview You have been assigned to create a training manual for NSSD’s IT personnel in which you test, describe, and recommend a variety of network security tools that, when used properly, will mitigate both the risk of future breaches and the effects of a breach when it takes place. Prompt Now it is […]

Computer Science 4-2 Final Project: Milestone Two: Security Policies Development AssignmentComputer Science 4-2 Final Project: Milestone Two: Security Policies Development Assignment

In Module Four, you will submit 10 security policies as part of the planned solution to mitigate the 10 security gaps identified in the Case Document. There should be one policy per security gap identified in the Case Document. Consider policies that address topics such as remote access, encryption and hashing (to control data flow), […]