Reference no: EM13756648
Phase I - Identify potential weaknesses from either the Aircraft Solutions or Quality Web Design Company
In this phase, you will choose either Aircraft Solutions or Quality Web Design as the company you will work with. The scenarios are in Doc Sharing in the Course Project select area. You will then identify potential security weaknesses.
Security weaknesses - You must choose two from the following three areas (hardware, software, and policy - excluding password policies) and identify an item that requires improved security.
To define the asset or policy with sufficient detail to justify your assessment, your assessment must include:
· the vulnerability associated with the asset or policy
· the possible threats against the asset or policy
· the likelihood that the threat will occur (risk)
· the consequences to mission critical business processes should the threat occur
· how the organization's competitive edge will be affected should the threat occur
To clarify an item that requires improved security, you must identify one of these items:
· one hardware and one software weakness
· one hardware and one policy weakness
· one software and one policy weakness
Other required elements include:
· Cover sheet
· APA-style
· In-text citations and Reference section
· Minimum length 3 pages, maximum length 5 pages (not counting cover sheet, diagram(s), references). Do not exceed the maximum length.
Phase II: the Course Project (comprised of Phase I and II) - Recommend solutions to the potential weaknesses from either the Aircraft Solutions or Quality Web Design Company
In this phase of the project you will include Part I (presumably improved as needed based upon Week 3 feedback) and then you will recommend solutions for the security weaknesses you identified in the Phase I.
Definition of the solution - Hardware solutions must include vendor, major specifications with an emphasis on the security features, and location of placement with diagram. Software solutions must include vendor and major specifications, with an emphasis on security features. Policy solutions must include the complete portion of the policy that addresses the weakness identified. Any outsourced solution must include the above details and the critical elements of the service level agreement.
Justification - You must address the efficacy of the solution in terms of the identified threats and vulnerabilities; the cost of the solution, including its purchase (if applicable); and its implementation, including training and maintenance.
Impact on business processes - You must discuss any potential positive or negative effects of the solution on business processes and discuss the need for a trade-off between security and business requirements using quantitative rather than simply qualitative statements.
Other required elements include:
· Cover sheet
· APA-style
· In-text citations and Reference section
· 5 reference minimum
· Minimum length of solutions: 6 pages, maximum length 10 pages (not counting cover sheet, diagram(s), references). Do not exceed the maximum length.
Discuss some of ethical and social issues facing business
: Social & Ethical: Discuss some of the current social and ethical issues in today's world. Discuss some of ethical and social issues facing business and users.
|
Critical value cannot be determined without knowing margin
: A cell phone service provider has selected a random sample of 20 of its customers in an effort to estimate the mean number of minutes used per day. The results of the sample included a sample mean of 34.5 minutes and a sample standard deviation equal..
|
Who did the christians massacre in celebration
: Who did the christians massacre in celebration?
|
Describe the lifestyle that crockett lived
: Describe the lifestyle that Crockett lived. How was his lifestyle different from yours? What would have attracted you to Crockett's lifestyle?
|
Identify potential weaknesses
: Identify potential weaknesses from either the Aircraft Solutions or Quality Web Design Company
|
Ingredients required to produce doughnuts
: You are considering opening a small doughnut shop in your hometown. Research the process required to make doughnuts. Create a bill of materials to list those ingredients required to produce doughnuts. Describe what would be the capacity of the doughn..
|
Used in procurement of projects
: What are four tools and techniques that could be used in procurement of projects and how and when should they be used? What are three risks of not including best HR practices into the management of a project?
|
Describe how and why information systems are used today
: Explain the main factors that you should consider before deciding whether to buy a laptop or a tablet. Identify the key features of a laptop and a tablet. Next, discuss three (3) important characteristics of each that might influence your decision.
|
What are the potential negative consequences either way
: You are a Contracting Officer for the Navy. You have released a solicitation through the Navy’s Seaport-e Multiple Award Contract for an IT contract with an estimated value of $150 million. Offerors are required to submit their proposals electronical..
|