Ientify and provide an assessment of the risks associated

Assignment Help Computer Engineering
Reference no: EM13462822

A new client of your security consulting firm is worried about the potential for data leaks that could expose it to financial losses as well as a damaged reputation. The client recently read a front-page story about a negligence lawsuit arising out of a data leak that exposed confidential client information. The source of the data leak was a peer-to-peer file sharing application that had been installed on an employee's desktop computer. An initial quick-look security assessment found that your client's concerns were well founded. At least one department was using a similar peer-to-peer file-sharing application to distribute promotional videos and audio podcasts to potential customers. Your team leader has asked you to prepare a short technology evaluation paper in which you address one of the problem areas  identified in the quick-look assessment:

  1. Data: Identify and provide an assessment of the risks associated with collection, processing, and storage of confidential client information .
  2. Software: Identify and provide an assessment of the risks associated with unauthorized installation of file-sharing software on company computers, including servers, desktops, and laptops.

Research and evaluate three or more technology-based solutions that could provide effective protection measures. Use one row per technology solution.

Your technology evaluation paper must begin with an executive summary followed by your technology evaluation matrix. The executive summary should provide an overview of your risk assessment and evaluation. It should also provide additional information to help the client understand your recommended solution. Your summary should be concise-approximately three pages long-and include the following elements:

  • an explanation of the information security threats and vulnerabilities associated with your selected option
  • a comparison of the capabilities and weaknesses of the candidate technology-based solutions
  • a recommendation of the best fit technology-based solution to solve/mitigate the problem associated with your selected option

 

Reference no: EM13462822

Questions Cloud

What is the url name and dotted quad ip address of an : the current ip address standard is 32 bits. ipv6 will increase the address length to 128 bits. an ip socket address
Explain fictitious client not a real person who suffers : describe a fictitious client not a real person who suffers from one of the mental illnesses you read about this week
Many phone companies are replacing the wire in their phone : many phone companies are replacing the wire in their phone systems with fiber optic cable. what do they expect to gain
Address the physical safety of guests staying in a hotel in : write a 350- to 700-word paper explaining the need for hotel security. include the following middot address the
Ientify and provide an assessment of the risks associated : a new client of your security consulting firm is worried about the potential for data leaks that could expose it to
Describe pulse code modulation phase shift modulation : 1. describe pulse code modulation phase shift modulation amplitude modulation and frequency modulation. indicate how
Why is it so important to measure change as a psychology : why is it so important to measure change? as a psychology major will your goal always be to change behavior? what
Describe the history or background of the illness : write a 1300- to 1650-word paper including the following middot explain the history or background of the illness
What types of devices are available today to secure a : write a 2-4 page paper on network security your paper should include the following topicsmiddot how a secure

Reviews

Write a Review

Computer Engineering Questions & Answers

  Reducing the project risks

How would an iterative approach reduce the project risks in comparison to the first approach? How might it reduce the risks in comparison to the second approach?

  What would be wrong with not writing returnstatement in a

what would be wrong with not writing returnstatement in a value returing function? can you have a returnstatement in a

  Kinds of digital and logical evidence

State some of the kinds of the digital and logical evidence, and special content data investigators may require to gather during an actual cyber-terrorism case.

  What would be the output from each program

The following two programs differ in that one uses parseFloat and the other does not. What would be the output from each program if the user inputs 4 followed by 2.

  Give description of the network design plan

For the equipment price list, make up price list based on fair market value for each peice of equipment. Do the same for the labor costs.

  Evaluates and contrast tcp and ud

Describe the need for the Transport Layer. Recognize the role of the Transport Layer as it provides the end to end transfer of data between applications.

  Benefit of web-based computing environment

Web-based applications like e-commerce and e-government exemplify the platform shift from the client/server computing to the Web-based computing so for this essay question.

  Database and characteristics of database

Explain the Database and describe the four characteristics of the database? Explain the Relational Database and generate a relational database for 5 employees.

  Write the assembly code to specify an array named src

Write the assembly code to specify an array named src that holds values: 01, 23, 45, 67, 89, and an array of five variables named dst, then write the code to copy the values in array src to array dst.

  Which jobs are possibly to change

Where would the computing profession be in 10 years, 25 years, 50 years? Will it be different than it is today? In what ways? Which jobs are likely to change.

  Recognize the objects involved in the task

Write down a short, structured design (pseudocode only) that accomplishes this task.

  Generate an er model

Generate an ER model

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd