-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathboards.html
91 lines (89 loc) · 3.66 KB
/
boards.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
<!--
Name: Mason
-->
<!DOCTYPE html>
<!-- Declares the document type and version -->
<html>
<head>
<!-- Contains meta-information about the document -->
<title>CSC 102 Program Obj</title>
<!-- Sets the title of the document, shown in the browser's title bar -->
<style>
/* Adds basic styling to the page */
body {
font-family: "Times New Roman", Times, serif;
margin: 0;
padding: 20px;
background-color: #f0edea;
}
header {
background-color: #4CAF50;
color: white;
padding: 10px 0;
text-align: center;
}
h1 {
margin: 0;
}
p, li {
background: white;
padding: 10px;
border: 1px solid #ccc;
border-radius: 4px;
margin-bottom: 10px;
}
ul {
list-style-type: none;
padding: 0;
}
.author {
font-weight: bold;
text-align: center;
margin-top: 20px;
}
</style>
</head>
<body>
<!-- The main content of the document -->
<header>
<!-- Contains introductory content -->
<h1>CSC 102 Program Obj</h1>
<!-- The main heading for the document -->
</header>
<p>
<!-- Descriptive paragraph about the code -->
This is code that is listing UAT program objectives for the major Network Security.
</p>
<p class="author">
<!-- Displaying name -->
Created by Mason
</p>
<!-- List of program objectives -->
<ul>
<li>
<!-- First objective -->
Create a network infrastructure design communications document that includes identified hardware components, connections to the outside world, identified physical layer connectivity (media) and addressing, including operational and security components in the design.
</li>
<li>
<!-- Second objective -->
Install, configure and test security hardware and software tools with supporting documentation such as port scanners, vulnerability detection systems, intrusion detection systems, firewalls, system hardening, anti-virus tools, patch management, auditing and assessment.
</li>
<li>
<!-- Third objective -->
Construct, implement and document a script or a program to automate a security-related process or other tasks such as installation, administration, management, mapping resources, logon scripts, patch management, updates, auditing, analysis and assessment.
</li>
<li>
<!-- Fourth objective -->
Create a policy or procedure that addresses events such as: a disaster recovery plan, a business continuity plan, an incident response policy, an acceptable usage document, an information security policy, a physical security policy, assessments or troubleshooting procedures.
</li>
<li>
<!-- Fifth objective -->
Develop a research report or implementation plan concerning legal and ethical best practices and mandated requirements that pertain to information security.
</li>
<li>
<!-- Sixth objective -->
Research, document, test and evaluate several current industry information security-based threats, risks, malicious activities, covert methodology, encryption technologies, mitigation techniques or unconventional tactics to prevent loss of sensitive information and data confidentiality, integrity and availability.
</li>
</ul>
</body>
</html>