Assignment Preparation: Activities include independent student reading and research.
NOTE: This is part two of a three-part assignment. The final version will be submitted in Week 4. It is expected that adjustments will be made in the final version based on the feedback provided in Weeks 2 and 3.
Don't use plagiarized sources. Get Your Custom Essay on
CMGT/400 Week Three Securing and Protecting Information
Just from $10/Page
Using the paper started in Week 2 add an additional 4-to 6-pages that describes the security authentication process.
- Discuss how this and other information security considerations will affect the design and development process for new information systems.
- Include a brief discussion of how to include preventative measures for securing data, such as (but not limited to) backups and remote or redundant storage.
- Note what role this will play in the other areas covered in the paper, including (but not limited to) virtualization and the cloud.
- Provide an overview of several systems and devices that can provide security services to meet the needs raised in the paper.
Format your paper consistent with APA guidelines.