Project #2: Security Strategy for Sifers-Grayson
Project #2: Security Strategy for Sifers-Grayson
Write:
1. An Introduction section which presents the security strategies being recommended in your
report. You should explain what how these strategies will improve the overall security posture of
Sifers-Grayson.
2. A Security Strategies section in which you present an analysis of the defensive security
strategies and then provide an explanation as to how each of the two selected defensive
strategies will improve the security posture for Sifers-Grayson. Include a comparison of the two
primary types of strategies – layered security and defense in depth. Then, explain how the
selected security strategies use one or both of these approaches. Use information from Project
#1 and the Red Team’s penetration tests to support your justification for implementing the
selected security strategies.
3. A Product Evaluations section in which you present and discuss the technologies and
products which will be used to implement each strategy. You must have a separate sub-section
for each defense in depth strategy. Under each sub-section, you will name and describe the
individual products (i.e. describe firewalls and then describe your chosen firewall product). Your
presentation of each product should be in the form of a recommendation to purchase /
implement.
4. A Summary Implementation Recommendations section in which you summarize your product
recommendations for products and technologies to be used in implementation the two defensive
security strategies. Be sure to explain the benefits of implementing the two strategies (e.g.
protection, detection, prevention of incidents caused by attacks).