Create and implement effective policies to mitigate risks

Assignment Help Computer Engineering
Reference no: EM132448472

Question: The objective is to present a Bid Response Proposal that provides a security solution for any business process of your choice. The financial business has 60 employees and is struggling with security issues both internal and external. Employees use laptops and have remote access to the office systems. Your Bid Response needs to be a turnkey solution that will provide a solution to but not limited to the following problems (so be creative):

1) Equipment is disappearing

2) No building or computer room security.

3) No policies (AUP)

4) No virus protection and experiencing viruses daily

5) No intrusion detection and experiencing intrusions daily

6) Passwords compromised

7) There is an Internet connection but no protection and content filtering

8) Sensitive information is being copied from systems

9) If a disaster should happen to the building there are no plans to recover

Minimum topics to be included in your Bid Response Proposal are the following:

1. Deliver a Bid Response Proposal to provide a business security solution to prevent malicious or unauthorized use of digital assets

2. Create and implement effective policies to mitigate risks

3. Deliver a detailed list of security products and pricing

4. Provide safeguards for the information assets

Format: Format for the project should be a 15-20 slide PowerPoint presentation with a budget sheet.

Reference no: EM132448472

Questions Cloud

Creating new ideas for the athletic department : In this module, you will write the second of the three business memos that you will write for the course. Creating new ideas for the athletic department.
Explain why the companys stock appears to be over : Determine whether your company appears to be correctly valued, overvalued, or undervalued based on your company's stock current price and model result.
Create proposal for new product in chief marketing officer : Create proposal for new product in chief marketing officer,would like to pursue to generate growth for your organization.three potential opportunities you would
Why the business needs to drive the IG strategy : Why the business needs to drive the IG strategy and why there must constantly be an alignment. How would you approach implementing an IG strategy
Create and implement effective policies to mitigate risks : The financial business has 60 employees and is struggling with security issues both internal and external. Employees use laptops and have remote access.
Describe situation believe using a swot analysis useful : Explain how you would roll it out. SWOT is an acronym that stands for Strengths, Weaknesses, Opportunities and Threats.Describe situation believe using a SWOT
Describing iam in a federated cloud application : Write an essay of at least 500 words discussing discussing IAM in a federated cloud application. Use the five paragraph format. Each paragraph must have.
Describe how operations security in current job : Describe how you do or could use operations security in your current job. Be sure to describe your job role (or desired job role)
What are the essential ingredients of a public-key directory : What are two different uses of public-key cryptography related to key distribution? What are the essential ingredients of a public-key directory?

Reviews

Write a Review

Computer Engineering Questions & Answers

  What is federalism

What is Federalism and why is it unique to the United States compared to other countries?

  Change the algorithms parameters and comment on the results

Apriori accepts only nominal data types while FPgrowth only accepts binominal data types.

  Give an illustration in which polymorphism would be helpful

write a 200- to 300-word short-answer response to the followingprovide an example in which polymorphism would be

  Prepare an opening statement that specifies organization

The graphically depicted solution is not included in the required page length. Explain what the client can expect from your services.

  Calculate the sum of the numbers from one to n

Write an assignment statement to calculate the sum of the numbers from 1 to N using Gauss's formula

  Display the sum and average of the numbers

Write a Java program that inserts 25 random integers ranging from 0 to 100 into an ArrayList in ascending order.

  How long should a system be idle to benefit from hibernating

How long should a system be idle to benefit from hibernating - Whenever a computer is idle, we can either put it in standby (where DRAM is still active) or we can let it hibernate.

  The response to eachnbspessay itemnbspshould not exceed two

the response to eachnbspessay itemnbspshould not exceed two 2 paragraphnbspusing double-line spacing and 1-in. page

  Distinguish between logical addresses and physical addresses

What are the tasks that the OS must accomplish in order to manage the memory requirements .Distinguish between logical addresses and physical addresses.

  Write a program to implement a set class along with member

Write a program to implement a "set" class along with member functions for union, intersection, difference, symmetric difference, and a test for subsets.

  How you would approach design for a new project

Consider the phases associated with both waterfall and Agile. How you would approach design for a new project, based off each of these SDLC approaches?

  Factors affecting the group process and outcome

In class, we introduced different factors which may affect group process and outcome, like group size and the status effect.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd