steps necessary to secure the back-end DB2 database within your organization, homework help

Unit 1

Don’t forget originality

You have been asked to make a presentation about the steps necessary to secure the back-end DB2 database within your organization. Address the following in the

presentation:

Introduction regarding description and importance of security in depth

UNIX server vulnerabilities

Hardening the UNIX system

Deployment of a Web server to be used by Navy intelligence for checking on project progress

Apache and Internet information server (IIS)—research and explain how these options might be used for the secure Web server scenario

At least 9 slides

presentation to address these points. The presentation planned should last about half an hour. Include speaker notes in the presentation. Plan

the presentation and speaker notes so that someone else could actually give the presentation.

Be sure to document your references using APA format.

Unit 3

Don’t forget originality

Choose five of the following topics related to perimeter security and prepare a 8 slides presentation on that topic. The slide presentation should contain speaker notes

to explain the subject further. Also, include a cover slide and a reference slide.

Use these five topics for the individual portion of the project:

Border routers

Screened subnets

Intrusion prevention system (IPS)

Proxy firewalls

Equipment redundancy

The individual presentation should include the following:

An explanation of how the security method works

Advantages and disadvantages of the chosen security

Trade-offs for using the specific security

Issues that are addressed by the security method chosen

Be sure to document your references using APA format.