Analyze the case using the security information

Assignment Help Computer Engineering
Reference no: EM132532780

Assignment: The written research paper should be 5-7 pages double spaced and APA compliant discussing Part I and II. The cover page and reference list are excluded. The PPT presentation should consist of 18-20 slides discussing Part I and II. All work must be original to the team.

Part I: For Part I, select one of the TOGAF Architecture Case Studies and apply the Threat Model Analysis" TMA 7-steps for security analysis.

Provide security recommendations for one the Case Studies based on the Threat Model Analysis" TMA 7-steps. Analyze the case using the security information presented in this residency to gain background information. Also, make assumptions as needed to build your case presentation.

Case Study Companies

• Department of Social Security (UK)

• Litton PRC (US)

• Ministry of Defense (UK)

• National Health Service (UK)

• NATO (Belgium)

• Police IT Organization (UK)

• QA Consulting (UK)

• Westpack (Australia)

Requirement: Since this will be an online residence, consideration is given to the students. For this reason, only two company case studies will be analyzed: Litton PRC and Westpack. The written Report and PPT must analyze the companies using the TMA 7-steps.

Part II: Respond to the following questions based on class readings, notes, and discussions so far. Think of a company with eCommerce presence and make assumptions as needed. Use APA formatting and at least 3-references from the materials reviewed.

1. How often should the organization refresh its assessment of top risks?

2. Who should own the top risks and who is accountable for results and to whom do they report?

3. Are there any organizational "blind spots" warranting attention?

4. How is the organization prepared to respond to extreme events?

5. Does the organization have the required skills to provide effective risk oversight?

6. As an Enterprise Architecture Professional would you recommend the TOGAF framework for enterprise architecture analysis? Why and why not?

7. As an Enterprise Architecture Professional would you recommend the WASP ZAP tool for findings vulnerabilities in web applications? Discuss the OWASP ZAP pros and cons, Pros and Cons, benefits, valuable features, room for improvement, stability, scalability, and customer service technical support.

Requirement: Written Report and PPT answering the above questions.

Reference no: EM132532780

Questions Cloud

Explain change management practices : Explain change management practices and the benefits of updating and implementing such practices. Identify best practices for change management process.
Calculate the average return on both the fund : Calculate the average return on both the Fund and the index, and the standard deviation of the returns on each. (Do not round intermediate calculations)
Implementation of ethical principles : Discuss if you think the implementation of ethical principles can help bring change in this country to individuals and society,with specific reference
Prepare the journal entries to recognize site restoration : Prepare the journal entries to recognize this site restoration cost the company would record upon initial acquisition and subsequently.
Analyze the case using the security information : Provide security recommendations for one the Case Studies based on the Threat Model Analysis" TMA 7-steps. Analyze the case using the security information.
Physical security control : What do you think is the single greatest physical threat to information systems? Fire? Hurricanes? Sabotage? Terrorism?
Prepare the journal entry to record the issuance of stock : Common stock to pay its recent attorney's bill of $50,000 for legal services on land access dispute. Prepare the journal entry to record the issuance of stock.
Physical security control : Some organizations prohibit workers from bringing certain kinds of devices into the workplace, such as cameras, cell phones, and USB drives.
How much cash was raised from the stock issuances : How much cash was raised from the stock issuances? Prepare journal entries for stock issuances. Sunny Corp. issues 5,000 shares of $10 par value common stock

Reviews

Write a Review

Computer Engineering Questions & Answers

  Perform insertion on a doubly-linked list

Write a pseudocode to perform insertion on a doubly-linked list.

  Find a criminal case that involved digital forensics

Do a bit of research on-line. Find a criminal case that involved Digital Forensics. Using WORD, write an ORIGINAL brief essay of 350 words about 3 paragraphs.

  How valuable would a site survey be to wlan planning

Some would argue that the cost of access points is so low now that site surveys are not worth the time. What do you think?

  Write a function that takes a string and a number of spaces

Write a function that takes a string and a number of spaces to insert between each letter, then print out the resulting string.

  Write a program that converts all lower case ascii values

Write a program that converts all lower case ascii values to upper case values, 1 letter at a time, if the letter is already upper case.

  Discuss the role and significance of circuit relay firewall

Discuss the main use, limitations, and possible security holes of your firewall and write it in your report - discuss the advantages and disadvantages

  Discuss the function of input and output devices

Discuss the function of input and output devices, and analyze the working principle of voice input and output systems with their present state of technology.

  A brief description of the policy and its content

Create a presentation that can be used to instruct individuals and groups on how to use IT Security Policy Framework to help .

  Explain what is the project

Based on week 13 reading assignment, describe an IT or similar business project you have done or are currently doing. In your discussion, provide information.

  Obtain the boolean expressions

Obtain the Boolean expressions for the following circuit

  Your boss has just heard about some nefarious computer

your boss has just heard about some nefarious computer activities called ping sweeps and port scans. he wants to know

  Discuss three conflict resolution strategies

Discuss three conflict resolution strategies learned in the class. For each of the strategies, provide an example where you can apply them in a personal.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd