Task 2.0: Research & Analysis

To:              CCUIT Project Team

From:          Dr. Dilbert, Manager

Re:          Exploration, solution & Testing

Now that you have completed your research proposal on the category you selected for securing the computer on the network.  You are working together great so far.  Your proposal has been reviewed by the client.  They have decided it would be best to concentrate on the following four sections for the handbook…

·         Access Control

·         Protecting against Attacks

·         Protecting against Data Loss

·         Versioning, Patches and Updates

 

The next step is to …

·         Research the existing computing environment and identify the threats

·         Explore and research a specific solution to the threats

·         Apply the solution to protect a PC

    ·       Apply the solution to protect a PC