For this week’s discussion you are asked to create a 3-5 paragraph “introduction” in which you describe and discuss the need for an organization’s implementation of network defense technologies. Your narrative should include discuss of the use of these technologies to implement controls from the (SC) family of security controls. You should identify and discuss at least three specific controls from this family. Focus on how these controls provide for implementation of countermeasures to protect the organization’s enterprise IT networks and their components from attacks.
Begin by analyzing a representative sample of security controls in the System and Communications Protection (SC) family of security controls. (There are over 50 controls in this control family.) Your focus should be on controls that are specific to secure use of network-based capabilities, e.g. SC-5 Denial-of-Service Protection, SC-8 Transmission Confidentiality and Integrity, SC-10 Network Disconnect, SC-11 Trusted Path, SC-20 Secure Name/Address resolution Service (Authoritative Source), and SC-23 Session Authenticity. You should consider if other security controls in this family will make your business case more effective.
Your introductory paragraphs will be incorporated into a business case for a project to replace the organization’s aging network defenses. Your introductory paragraphs should support (explain) the Director of IT Security’s planned activities in this area for the proposed project. Remember to use and cite authoritative sources in your work. Place your list of references at the end of your paper.