Security Services

 

Transmission control protocol/internet protocol (TCP/IP) was designed by the United States Department of Defense to share information between researchers at different institutions across the United States. The suite of TCP/IP protocols has evolved into a network of networks that covers the globe. TCP/IP is now known as the protocol of the Internet. For your initial post, consider the scenario below.

Your organization has a TCP/IP network that covers three cities and five office locations. Your organization utilizes the following business services: virtual private networks (VPNs), Internet phone, Internet fax, intranet chatting, and emails. Your supervisor is concerned with the many hacking incidents that have been reported in the news and has put you in charge of preparing a short report of the Internet services that are used at the organization and the possible vulnerabilities of each service. Considering that your supervisor is not a technical person and has indicated that he will share your report with upper management to improve the security landscape of the organization, be sure to be clear, concise, and comprehensive in addressing all relevant areas in your report..

Create your short report within the initial post window. In your report, address each of the TCP/IP business services that is outlined above. Explain the security vulnerabilities inherent to each service that may impact the organization

NEED A CUSTOMIZED PAPER ON THE ABOVE DETAILS?

Submit your order now!