Information security

Assignment Help Basic Computer Science
Reference no: EM132513826

You may NOT recycle any of your previous writing into this paper, it should be a brand new paper.

We have covered the following primary topics thus far:

Confidentiality, integrity, availability

Risk Management

Encryption

Access Management

Security Tools

For your paper I want you to create a risk assessment report for the following fictional business. Be sure to touch on all of the primary topics we have discussed, and leverage them in your proposal. For your final, we will be creating a much more rigorous version of this so take the time to practice these initial concepts.

SSU Incorporated is a marketing data company that deals with several technology stacks to attempt to form an "online identify" for consumers.

SSU Inc does this by working with partners who supply information such as demographics, purchasing patterns, browser history, and more.

The primary function of the business is to gather all of the information about a particular person so that targeted marketing ads can be sold to potential clients.

You may assume that SSU Inc uses any technology that you wish. Discuss how each of the topics above relates to their business. Assess the potential risk of their operation and propose a plan to incorporate encryption, access management, and security tools to keep them safe.

Reference no: EM132513826

Questions Cloud

What the cost of each one-pound bag of cornflakes is : VNN paid $60 for 100 one-pound biodegradable plastic bags into which the cornflakes were placed. The cost of each one-pound bag of cornflakes is
What observations can you make about the population : What is the probability that a random sample of 90 test takers will provide a sample mean test score within 10 points of the population mean of 502
How you would test type of intelligence : This chapter discussed multiple types of intelligence and intelligence tests. Gardner identified 9 different types of intelligences. Choose ONE type.
Record the two journal entries cmk would make at time : CMK, Inc. sold $60,000 of inventory to VNN, Inc. for $90,000 at 2/10, net 30. Record the two journal entries CMK would make at the time of sale.
Information security : SSU Incorporated is a marketing data company that deals with several technology stacks to attempt to form an "online identify" for consumers.
What conclusions can be drawn for each quality measure : What conclusions can be drawn for each quality measure over the 5-year period? What trends do you see for each quality measure over the 5-year period?
Discuss the recognition and measurement of revenue arising : Discuss the recognition and measurement of revenue arising on the contract with MSL for the manufacture, installation and integration of the cash-counting
Describe the situation and conflict : Describe the situation and conflict. Use pseudonyms and do not identify any person or location where the conflict occurred. Explain how you handled the conflict
Record the journal entry for the write-off : BVC wrote off a $10,000 receivable on 12/23/XX. Record the journal entry for the write-off. Make sure to format your entries properly.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is the potential future impact on society

What is the potential future impact on society of emerging information systems that are currently under research and development.

  Application to one of the major app stores

1) Research and detail the steps needed in order to publish an application to one of the major App stores. These stores include the Mac App Store, the Windows Store, Google Play, or iOS App Store.

  Rate of change of the cpi reached its maximum

During what year does the model predict that the rate of change of the CPI reached its maximum?

  What possible complications might arise for embedded system

What possible complications might arise for embedded systems?

  Personal consumption or purchasing decisions

Price elasticity, income elasticity, and cross elasticity are interesting concepts but no one really uses such considerations when making personal consumption

  Explain different types of emerging technologies

How to identify and explain different Types of Emerging Technologies?

  What role do end users play in incident reporting

What role do end users play in incident reporting? Should end users be encouraged to report suspicious occurrences? Why or why not?

  Give the order in which the packets are transmitted

weighted fair queuing with flow 2 having twice as much share as flow 1, and flow 3 having 1.5 times as much share as flow

  Relational database and no sql database

Discuss the differences between Relational database (SQL) and No SQL database. Which one would you prefer and why?

  Generate a random number from normal distribution

lname must be generated at random using specified uniform distributions, i.e., [X, Y] means that some random value between X and Yis chosen for each record by your implementation.

  What is the probability that the game goes into overtime

What is the probability that the game goes into overtime?

  What price should the company charge for a razor

Assuming the price elasticity of demand for blades is three. What price should the company charge for a razor and for a blade?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd