steps necessary to secure the back-end DB2 database within your organization, homework help
Unit 1
Don’t forget originality
You have been asked to make a presentation about the steps necessary to secure the back-end DB2 database within your organization. Address the following in the
presentation:
Introduction regarding description and importance of security in depth
UNIX server vulnerabilities
Hardening the UNIX system
Deployment of a Web server to be used by Navy intelligence for checking on project progress
Apache and Internet information server (IIS)—research and explain how these options might be used for the secure Web server scenario
At least 9 slides
presentation to address these points. The presentation planned should last about half an hour. Include speaker notes in the presentation. Plan
the presentation and speaker notes so that someone else could actually give the presentation.
Be sure to document your references using APA format.
Unit 3
Don’t forget originality
Choose five of the following topics related to perimeter security and prepare a 8 slides presentation on that topic. The slide presentation should contain speaker notes
to explain the subject further. Also, include a cover slide and a reference slide.
Use these five topics for the individual portion of the project:
Border routers
Screened subnets
Intrusion prevention system (IPS)
Proxy firewalls
Equipment redundancy
The individual presentation should include the following:
An explanation of how the security method works
Advantages and disadvantages of the chosen security
Trade-offs for using the specific security
Issues that are addressed by the security method chosen
Be sure to document your references using APA format.