Course Hero Logo

Enterprise Network Security revised.docx - Running Head:...

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 1 - 6 out of 19 pages.

Running Head: ENTERPRISE NETWORK SECURITYiEnterprise Network SecurityInstitutionName
ENTERPRISE NETWORK SECURITYiiTable of ContentsExecutive Summary....................................................................................................................................iii1.0Policy Gap Analysis.........................................................................................................................11.1 Introduction.......................................................................................................................................12.0 Protocols for Streaming Services...........................................................................................................32.1Common Streaming Protocols............................................................................................................43.0 Securing the New Company from Cyber Attacks..................................................................................54.0 Technical Vulnerabilities Associated with the Target Company.............................................................55.0 Merged Network Infrastructure.............................................................................................................66.0 Wireless and BYOD Policies.................................................................................................................76.1 Current Stance...................................................................................................................................76.2 What need to be done to Comply with Policy....................................................................................87.0 Data Protection Plan............................................................................................................................108.0 Supply Chain Risk...............................................................................................................................119.0 Vulnerability Management Program....................................................................................................1210.0 Training requirement.........................................................................................................................1211.0 Conclusion.........................................................................................................................................13References.................................................................................................................................................14
ENTERPRISE NETWORK SECURITYiiiExecutive SummaryCompanies entering into a mergers and acquisition agreement must consider the securityand the possibility data breach. This paper discusses the merger between Disney and Netflix andthe system security consideration of the new company. The problem of data breach on mergershas been identified as one of the causes that can lead to a no-go mergers and acquisition in casethey are discovered before the agreement has not been completed. A data breach will beprevented through the use of appropriate streaming services. Media streaming protocolscommonly used include the MPEG-DASH, HTTP streaming, smooth streaming and HDS.Understanding the streaming services will be helpful in formulating protection for the targetcompany by identifying the technical vulnerability of such company since either the parentcompanies had security issues or not cyber security threats are still in existence and the companyneeds to set the required security needs in place. Merged network infrastructure on which thenew company will operate will be formulated which will ensure customer preferred media filesare delivered. This will dictate the required BYOD policy to be implemented by the newcompany but this will be dependent on the security policy of the new company which isindependent of the parent company’s security policy. A data protection plan is then formulated sothat the data is protected from any possible threats from malicious software or the attack byhackers. The supply chain risks are identified and their possible solutions suggested to protect thecompany from possible losses that might result from such risks and minimizing them throughhedging. The staff needs to be updated on any possible changes system requirements and trainedin case the new software requires new skills.The executive of the new company will then bebriefed on system security of the new company.
ENTERPRISE NETWORK SECURITYiv
ENTERPRISE NETWORK SECURITY11.0Policy Gap Analysis1.1 IntroductionOne of the most critical issues that a company has to consider before they enter into amerger and acquisition agreement is the possibility that the security, privacy and breach risk arekept as minimal as possible. While some mergers and acquisitions will require that the former

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 19 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Winter
Professor
ArgwingsOtieno

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture