M4D1: Security Considerations

This activity will address module outcomes 1 and 3. Upon completion of this activity, you will be able to:

  • Identify the goals and objectives related to enterprise security architecture. (CO 1)
  • Identify the correlation among people, processes, and technology as they relate to EISA. (CO 1, 3, 5)

When considering how to best implement effective security across an enterprise, one approach starts by looking across the entire network structure and creating separate entities so that security gaps can be identified at every level and security subsequently implemented. There are other considerations when implementing enterprise security architecture. Some of these are discussed in the following reports from Microsoft.

Read through each report below:

Based on the whitepapers as well as outside sources and class readings, respond to the following:

  • What are the goals and objectives of enterprise security architecture?
  • How does enterprise security architecture within the articles support business goals and strategy?
  • What are some of the important complexities to consider when developing the enterprise security architecture? Why?
  • Discuss the importance of people and their roles when creating an enterprise security architecture.
  • What is the relation between process and technology?

Post your primary response. Read any postings already provided by your instructor or fellow students. Read and respond to the conclusions drawn by at least two of your classmates. Remember to read the feedback to your own major postings and reply to it throughout the module.

Do you need urgent help with this or a similar assignment? We got you. Simply place your order and leave the rest to our experts.

Order Now

Quality Guaranteed!

Written From Scratch.

We Keep Time!

Scroll to Top