IT Systems Architecture

You are a senior-level employee, and you must tailor your deliverables to suit your audience: the leadership of the organization. You may choose to use a fictitious organization, or model your organization on an existing organization. Remember that your deliverables should include proper citations.
Leadership is not familiar with the architecture of the IT systems, nor are they familiar with the types of threats that are likely or the security mechanisms in place to ward off those threats. You will provide this information in tabular format and call it the Network Security and Vulnerability Threat Table. Refer to this threat table template for guidance on creating this document.
Before you begin, select the links below to review some material on information security. These resources will help you complete the network security and vulnerability threat table.
• LAN security
• availability
Now you’re ready to create your table. Include and define the following components of security in the architecture of your organization, and explain if threats to these components are likely, or unlikely:
• LAN security
• identity management
• physical security
• personal security
• availability
• privacy

Our customer support team is here to answer your questions. Ask us anything!