Security weaknesses

Assignment Help Computer Network Security
Reference no: EM13754047

Security Assessment and Recommendations

Overview

This course does involve a lot of technical information and theory but, what really matters is how this knowledge can be used to identify and remediate real-world security issues. What you learn in this course should be directly applicable to your work environment. The course project that you will complete is designed to further this goal. In the first part of the project you will choose an organization from one of two given scenarios (below), identify potential security weaknesses, and in the second part of the project, you will recommend solutions.

Phase I

In this phase you will choose either Aircraft Solutions or Quality Web Design as the company you will work with. You will then identify potential security weaknesses.

Security weaknesses - You must choose two from the following three areas:
· hardware
· software
· policy (excluding password policies)

and identify an item that requires improved security. To clarify: you must identify
a) one hardware and one software weakness or,

b) one hardware and one policy weakness or,

c) one software and one policy weakness.

You must define the asset or policy with sufficient detail to justify your assessment. Your assessment must include:

· the vulnerability associated with the asset or policy
· the possible threats against the asset or policy
· the likelihood that the threat will occur (risk)
· the consequences to mission critical business processes should the threat occur
· how the organization's competitive edge will be affected should the threat occur

Phase II

In this phase of the project you will include Phase I (presumably improved as needed based upon week 3 feedback) and then you will recommend solutions for the security weaknesses you identified in the phase I.

Definition of the solution - Hardware solutions must include vendor, major specifications with an emphasis on the security features, location of placement with diagram. Software solutions must include vendor, major specifications with an emphasis on security features. Policy solutions must include the complete portion of the policy that addresses the weakness identified. Any outsourced solution must include the above details and the critical elements of the service level agreement.

Justification - You must address the efficacy of the solution in terms of the identified threats and vulnerabilities, the cost of the solution including its purchase (if applicable) and its implementation including training and maintenance.

Impact on business processes - You must discuss any potential positive or negative effects of the solution on business processes and discuss the need for a trade-off between security and business requirements using quantitative rather than simply qualitative statements.

Reference no: EM13754047

Questions Cloud

When referring to a note receivable or promissory note : When referring to a note receivable or promissory note:
Current assets are usually listed in order : Current assets are usually listed in order
Write-off method of accounting for uncollectible accounts : Under the direct write-off method of accounting for uncollectible accounts, Bad Debts Expense is debited
Members of controlled group share but which tax attribute : Members of a controlled group share all but which tax attribute?
Security weaknesses : In this phase you will choose either Aircraft Solutions or Quality Web Design as the company you will work with. You will then identify potential security weaknesses
Discuss the development of a divided nation on vietnam war : Identify and discuss the development of a divided nation and culture during the 1960's-70' with an emphasis on the Vietnam War.
Compute the groups charitable contribution deduction : ParentCo's separate taxable income was $350,000, and SubCo's was $225,000. Consolidated taxable income before contributions was $400,000. Charitable contributions made by the affiliated group included $15,000 by ParentCo and $20,000 by SubCo. Compute..
Corporation is not eligible for consolidated return status : Which corporation is not eligible for consolidated return status?
Calculate the monthly mortgage payment of principal : Calculate the monthly mortgage payment of principal and interest for the a loan with an initial balance of 150,000, an annual stated interest rate of 6%, and 30 years to maturity. Use Excel to develop this response and present your result within a..

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd