Thursday, May 23, 2019
Identify potential weaknesses from either the Aircraft Solutions or Quality Web Design Company Essay
In this phase you  go forth choose either Aircraft Solutions or Quality Web Design as the company you will work with. The scenarios are in Doc Sharing in the Course  support select area. You will then identify potential security weaknesses. security measures weaknesses  You must choose two from the following three areas (hardware, software, and policy  excluding password policies) and identify an item that requires improved security.To define the asset or policy with  ample detail to justify your assessment, your assessment must  admit* the vulnerability associated with the asset or policy* the possible  menaces against the asset or policy* the likelihood that the threat will occur (risk)* the consequences to mission critical  dividing line processes should the threat occur * how the organizations competitive edge will be affected should the threat occurTo clarify an item that requires improved security, you must identify  bingle of these items* one hardware and one software weakness   * one hardware and one policy weakness* one software and one policy weaknessOther required elements  allow* Cover sheet* APA-style* In-text citations and Reference section*  marginal length 3 pages, maximum length 5 pages (not counting  rachis sheet,diagram(s), references). Do not exceed the maximum length. manikin II the Course Project (comprised of Phase I and II)  Recommend solutions to the potential weaknesses from either the Aircraft Solutions or Quality Web Design CompanyIn this phase of the project you will  take on Part I (presumably improved as needed based upon Week 3 feedback) and then you will recommend solutions for the security weaknesses you identified in the Phase I.Definition of the solution  Hardware solutions must include  trafficker, major specifications with an emphasis on the security features, and location of placement with diagram. Software solutions must include vendor and major specifications, with an emphasis on security features. Policy solutions must inc   lude the complete portion of the policy that addresses the weakness identified. Any outsourced solution must include the above details and the critical elements of the service level agreement.Justification  You must address the efficacy of the solution in terms of the identified threats and vulnerabilities the cost of the solution, including its leverage (if applicable) and its implementation, including training and maintenance.Impact on business processes  You must discuss any potential positive or negative effects of the solution on business processes and discuss the need for a trade-off between security and business requirements using quantitative rather than simply qualitative statements.Other required elements include* Cover sheet* APA-style* In-text citations and Reference section* 5 reference minimum* Minimum length of solutions 6 pages, maximum length 10 pages (not countingcover sheet, diagram(s), references). Do not exceed the maximum lengthP.S. Phase 1 is done and attached   . Just need help with phase 2.  
Subscribe to:
Post Comments (Atom)
 
 
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.