[Get Solution] Protective and Detective Measures
1. An Introduction section which presents the security strategies being recommended in your report. You should explain what how these strategies will improve the overall security posture of Sifers-Grayson. 2. A Security Strategies section in which you present an analysis of the defensive security strategies and then provide an explanation as to how each of the two selected defensive strategies will improve the security posture for Sifers-Grayson. Include a comparison of the two primary types of strategies layered security and defense in depth. Then, explain how the selected security strategies use one or both of these approaches. Use information from Project #1 and the Red Teams penetration tests to support your justification for implementing the selected security strategies. 3. A Product Evaluations section in which you present and discuss the technologies and products which will be used to implement each strategy. You must have a separate sub-section for each defense in depth strategy. Under each sub-section, you will name and describe the individual products (i.e. describe firewalls and then describe your chosen firewall product). Your presentation of each product should be in the form of a recommendation to purchase / implement. 4. A Summary Implementation Recommendations section in which you summarize your product recommendations for products and technologies to be used in implementation the two defensive security strategies. Be sure to explain the benefits of implementing the two strategies (e.g. protection, detection, prevention of incidents caused by attacks).