IT infrastructure of an enterprise has:
a) Database servers, storage systems (SAN & NAS) for data storage
b) Computers, applications to process the data
c) Network components to enable connectivity among computers and servers
In this research, your goal is to secure the data processed by these IT components.
Prepare
• Review the APA Citation Style guide if necessary. You can also consult the Learning Commons for writing support and library resources.
• Carefully review the Chapter 8, Chapter 11, and Chapter 12 of the textbook. The textbook is your primary source of information.
Research
• Research and analyze potential vulnerabilities and security challenges that are associated with these IT components and that eventually threatens confidentiality, integrity, and availability of data. Consider both the technical and non-technical vulnerabilities.
• Research and analyze various security countermeasures and solutions to secure data. Think about countermeasures in policy, human, database, application, computer, storage, server, network, data, object, and application dimensions.