Utilise Design Methodologies for Security Architecture Assessment
Summarise the business operations and current network infrastructure.
1.Provide your analysis of the business security requirements based on your review.Your analysis should describe the business requirements for:
Security levels
Security perimeters
Security features
Security mode
If you are completing this for the case study organisation, review the information in the Simulation Pack to help you answer these questions. If you are completing this for your own business, you should review relevant documentation to formulate your answer.
Procedures for designing security architecture
1.Describe the procedures that need to be followed for designing security architecture.
If you are completing this for the case study organisation, review the information in the Simulation Pack to help you answer these questions. If you are completing this for your own business, you should review relevant documentation to formulate your answer.
- Data types
Describe the types of data that will be included in the security architecture as relevant to the business.
- Design methodologies
Describe at least three industry standard design methodologies that can be used in security architecture design.