Running Head: Outcome Assessment1Outcome Assessment 5 Project RequirementsStudent8/11/2015Provide detailed answers for the following questions. Ensure to elaborate on your responseswith explanations and examples where applicable.1.Security Zones andProtection Measuresa) Define what a security zone is in the context of network security. Explain whysecurity zones are important and provide an example of how an organization mightuse them to protect sensitive information.b) Discuss the role of Tempest technology in protecting electronic equipment andpreventing eavesdropping. What are some other methods for shielding againstelectromagnetic interference (EMI) and radio frequency interference (RFI)?2.Social Engineering AttacksList and explain four types of social engineering attacks. For each attack type, suggestspecific protection measures your organization could implement to prevent orminimize the damage caused by these types of attacks.3.Physical Security and Environmental ControlsDescribe four physical security and environmental control measures you wouldrecommend for a small organization. Justify your choices and explain how eachmeasure contributes to the overall protection of the organization’s assets.4.Access Control Principles andRecommendations
Page 2
Page 3
Page 4
Preview Mode
This document has 10 pages. Sign in to access the full document!