English |Article writing
There are many methods, mechanisms, and practices discussed for the management of security. Discuss what you deem is the most effective security management framework for your organization and why.
1 page apa format
3 sources
part 2
Complete a one page reflection essay on this course.
apa format 1page
Web Resources for Telecommunications & Network Security:
1. Methodology of an Attack
· www.schneier.com/paper-attacktrees-ddj-ft.html
2. OSI Reference Model
· http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/introint.htm#wp1020580
3. Internet Protocol
· http://www.protocols.com/pbook/tcpip2.htm#IP
4. IPv6
· http://www.protocols.com/pbook/tcpip2.htm#IPv6
5. Threats
· http://www.fcc.gov/voip
· http://www.whitedust.net/article/30/VoIP%20Security:%20Uncovered/
· http://communication.howstuffworks.com/ip-telephony.htm
6. Centralized Remote User Authentication
· http://publib.boulder.ibm.com/infocenter/pseries/v5r3/index.jsp?topic=/com.ibm.aix.security/doc/security/radius_server.htm
· http://www.untruth.org/~josh/security/radius/radius-auth.html
7. Kerberos Authentication
· http://web.mit.edu/kerberous/
· http://tools.ietf.org/html/rfc1510
8. Directory Services
· http://www.ehsco.com/reading/19961215ncf1.html
9. Configuration Services
· http://tools.ietf.org/html/rfc2131
10. Storage Data Services
· http://www.phptr.com/articles/article.asp?p=169578&rl=1
11. Printing Services
· http://tools.ietf.org/html/rfc2910
· http://tools.ietf.org/html/rfc1179
· http://www.cups.org/
12. Countermeasures
• http://www.dnssec.net/