1 risk assessment of ict systemperform risk assessment for

Assignment Help Computer Engineering
Reference no: EM13347026

1. Risk Assessment of ICT System

Perform risk assessment for the organization and it is related to ICT security threats and vulnerabilities. The final outcome is to identify :

a. critical ICT assets and their vulnerabilities;

b. to recommend measures to ensure that those ICT assets are in forensic readiness when the computer security incidents occur.

Idea is to ensure also preservation of digital evidences where it is practicable.

I need one specific example of that ICT Risk Assessment process (e.g. what are identified critical assets, how they are classified according to its threats ,impact and vulnerabilities) and what are the measures for forencis readiines after threats/vulnerabilities are identified, which will expand ideas to finalize my document-see above under a., and then recommend measures for forensic readiness-see above under b.).

2. Developing Computer Incident Response System on WAMP platform

I need help with initial programming of the system as displayed in the attachment..its about simple computer incident response system that , as per my idea, shall be universal and easily deployed elsewhere on Windows platforms. In this attempt, I would like to build it on WAMP with Apache as Webserver, My SQL as database server and PHP scripting language which I already have on my system but this is not highly constrained.

Any initial (or if you have pre-build) working system as described in attached algorithm will help me to continue tailoring/re-modifying it to my needs and I will enrich it with more scripts that will generate reports (as emails) when various security breaches occur on ICT network.

 

Reference no: EM13347026

Questions Cloud

Question 1a cantilever beam of constant cross section : question 1a cantilever beam of constant cross section carries a uniformly distributed load w nm across half its span as
1 three-person problem of points pascal fermat and their : 1 three-person problem of points pascal fermat and their old friend the chevalier de mere each put ge10.00 into a pot
Create a inventory management system in c applicationthis : create a inventory management system in c applicationthis is what the system must be able to
1 determine the value of c if any so that the system of : 1. determine the value of c if any so that the system of equations with the following augmented matrixhas the requested
1 risk assessment of ict systemperform risk assessment for : 1. risk assessment of ict systemperform risk assessment for the organization and it is related to ict security threats
Restaurant marketing leadership for this assignment you : restaurant marketing leadership for this assignment you will be evaluating mcdonalds restaurants.bullbased on the case
Part 1write a cc program to read a data file and extract : part 1write a cc program to read a data file and extract parameters. the program must obtain the filename via a
Topic-critically analyse the role of different stakeholders : topic-critically analyse the role of different stakeholders in tourism planning and policy drawing from a range of
Problem 1analyzing a current om techniquefind one scholarly : problem 1analyzing a current om techniquefind one scholarly journal article reporting on one or more of the following

Reviews

Write a Review

Computer Engineering Questions & Answers

  Cloud to provide crm installations

What "Cloud" can provide to the CRM installations in order to ease the adoption of such systems?

  Write a program that swaps the elements of an array pairwise

Write a program that swaps the elements of an array pairwise. Start from the left of the array, take 2 elements at a time and swap the two elements. Continue in this fashion until you reach the end of the array.

  Write down a driver program to test library

Write down a library Cylinder containing functions to compute the total surface area, lateral surface area, and volume of a right-circular cylinder.

  Describe the strengths and weaknesses of the information

Prepare a paper identifying and describing how information systems are used to support the business processes in an organization. You can describe the business processes within your current employer or an organization with which you are familiar. ..

  Write a java program that prints all real solutions

make a class QuadraticEquation whose constructor receives the coefficients a, b, c of the quadratic equation. Supply methods getSolution1 and getSolution2 that get the solutions, using the quadratic formula, or 0 if no solution exists. The getSolu..

  Define the use of databases and the benefits

define the use of databases in your organization. Include what database applications are used (Microsoft Access, DB2, Oracle, etc.). Conclude by proposing improvements.

  Do clear data from my maskedtextbox named "mtbpac"

I am using Visual Basic.NET with Microsoft Visual Studio 2005. I have a project with a User Control that I have created. I have a button that I named Clear. I require to clear the data from my maskedtextbox named "mtbPAC".

  Designing a solution to the problem

Designing a solution to the problem and implementing the design using principles of correct syntax

  Companies sometimes purchase expensive applications

Companies sometimes purchase expensive applications, and after that under-utilize or misuse these. In a sense, the economic downturn has been beneficial, as many companies are beginning to more regularly scrutinize the programs they are investing i..

  Prove the following property of boolean algebra

prove the following property of Boolean algebra . give a reason for each step !!

  Explain some benefits of code citations

What is an instance of how one would re-use a C# object. At the same time, one must avoid code plagiarism. How does one reconcile the two? Describe some benefits of code citations in addition to avoiding plagiarism.

  Give method to separate the input string into 3 parts

Design and make a program that validates the value a user enters into a TextBox control to ensure that the entry is a valid telephone number. The application should accept a maximum of 12 characters. When the user clicks a button, the program shou..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd