Conduct gt engineering business

Assignment Help Computer Network Security
Reference no: EM133540726 , Length: 5 Pages

Assignment:

Instructions

As Information Security Consultant with Cyber Security Services, you have been asked to perform a risk assessment for a client, the Green Technology Engineering Company.

GT Engineering employs a large number of customer service field engineers who number in the hundreds nationwide. Most of these employees use their own computers (30% tablets, 65% laptops, and 5% desktops) to conduct GT Engineering business.

You have been tasked to do an assessment of the risks associated with the use of home computers versus company owned and managed computers, to understand whether GT Engineering can justify the capital and operational expense.

  • First, to derive a general appreciation for this problem, you will perform a qualitative risk assessment for this case.
  • Next, you will take your analysis to the next level and perform a quantitative risk assessment. For that, you will need to make best estimates on the value of assets, costs associated with purchasing and supporting company -owned computers, exposure to threats, and loss expectancy.

Produce a Word document, approximately 2 to 5 pages long, not counting the title and references pages.

Reference no: EM133540726

Questions Cloud

Analyse the external environment facing : Drawing on your knowledge of the PESTEL model, analyse the external environment facing global pharmaceutical industry and identify the key external factors
What clarifying questions should you be asking : What clarifying questions should you be asking your stakeholders while conducting this task. List at least five?
What happens if you dont establish that difference : Why is it important to establish that difference prior to presenting facts? What happens if you dont establish that difference?
About an upcoming meeting with texas pacific group : The qualitative and quantitative analyses should together tell a compelling, end-to-end story; they are not separate and should not be treated as such.
Conduct gt engineering business : Most of these employees use their own computers (30% tablets, 65% laptops, and 5% desktops) to conduct GT Engineering business.
How to complete a task in your office : Create an infographic that explains how to complete a task in your office. Your infographic will be posted in the office so that the steps can be easily
What is the congruence trap and how can it be avoided : What is the congruence trap and how can it be avoided? How can organizations develop ambidextrous capabilities? Why do so many transformation big leaps fail?
Analysis of future and option strategies future : Based on your analysis of future and option strategies future Crude oil Chicago Mercantile Exchange (CME) Group Hedging Strategy and option Apple
Make an overview about the topic : Make an overview about the topic and context below which is about Innovative Trends in Dining and Meeting and Hotel Revenues and Personal Space

Reviews

Write a Review

Computer Network Security Questions & Answers

  Provide data security technologies

Explain what viruses are, how it occurs and the types of cybercrimes that can result from it, and how to better protect computers.

  Explain the fundamental concepts of cryptographic algorithms

MITS 5004 IT SECURITY - Victorian Institute of technology - Explain why asynchronous I/O activity is a problem with many memory protection schemes

  Formulate a digital forensics process

Write a guide on how to load a VHD file and what strategies should you use? Which acquisition method should you use?

  Design a network or network component

Students are to design a network or network component using a design tool (example: Visio or CAD). Required is a visual representation of this network along with a document describing all aspect of the network design including product selection.

  What is software firewalls

Using the Web, search for "software firewalls". Examine the various alternatives available and compare their functionality, cost, features, and type of protection.

  Saving billions through flexible manufacturing

With smaller companies saving thousands and larger companies saving billions through flexible manufacturing, if you are a discrete parts manufacturer

  Determine the stories about social engineering attacks

Perform a search on the web for article and stories about social engineering attacks or reverse social engineering attacks.

  What are example of a real an actual inside network attack

What are some example of a real an actual inside network attack. What happened? How did the attack happened? How the attack could have been prevented?

  Write the word statistic without the repeated letters

Write the word "statistic" without the repeated letters. The number of letters that remain the same will depend upon the choice of the keyword.

  Developing a cybersecurity strategy

Describe the role of planning when developing a cybersecurity strategy and what key deliverables would ensure an effective implementation

  Create an issue-specific security policy

Create an Issue-Specific Security Policy for the case organization - employee use of these technologies based on the case organizations philosophy

  Ethical dilemma

Consider the "dirty-hands problem" in Badaracco and mentioned in the case study, "Building a 'Backdoor' to the iPhone: An Ethical Dilemma."

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd