should be FAMILIAR WITH TECHNOLOGIES FOR CYBERSECURITY AND UNDERSTAND WHAT A CISO LOOKS FOR WHEN EVALUATING NEW TECHNOLOGIES FOR USE!!!!!
Save your time - order a paper!
Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlinesOrder Paper Now
IDPS technology (not less than 6 pages)
Technology to research is Intrusion Detection and Prevention System (IDPS) pick one. Research and evaluate its capabilities, costs, maintenance requirements, flexibility, and feasibility for implementation. The analysis should include pros and cons, potential barriers to success, vulnerabilities eliminated or reduced, convergence issues, first adopters (if the technology is new), and any other issues you deem important to consider. Use the technical evaluation methodology.
Requirements Need to have the following sections fully covered:
Introduction- Clearly describes and introduces the paper. Provides clear background information and facts to support the paper.
Conclusion- Clearly summarizes the main points from the paper. These include the capabilities, costs, maintenance requirements, flexibility and feasibility for implementation.
Capabilities– Clearly explains the capabilities of the technology.
Costs– Clearly explains the costs involved with the technology (Look up pricing on the GSA schedule 70 for an IDPS technology)
Maintenance Requirements– Clearly explains the maintenance requirements of the new technology.
Flexibility– Clearly explains the flexibility of the technology.
Feasibility of Implementation– Clearly explains the feasibility of implementing the technology.
Issues– Clearly explains the pros and cons, barriers, issues, vulnerabilities, first adopters (if technology is new), etc. Must cover at least 5 areas.
using a min of 5 authoritative or scholarly sources in paper. One must be NIST SP 800-53. APA format