Thoughts and understanding of requirements

Assignment Help Basic Computer Science
Reference no: EM133067109

PART 1:

Provide your thoughts and understanding of requirements:

1. Who consumes requirements?

2. Getting security requirements implemented.

3. Why do good requirements go bad?

PART 2:

Your midterm project was to provide a security assessment for [X], an online software company that specialize in selling ad spaces in their parent company's magazine. [X] manages an online database that allows their customers to upload and pay for their business ads for magazine placement. Because [X] ‘s database needs to connect to the parent company's database, the parent company has requested that [X] system be assessed and verified as secure.

Now that you have provided your security assessment, the next step is to provide [X] with your Security Portfolio. Using this week's Reading on the NIST framework that includes the 5-step process for creating a balanced portfolio of security products, your assignment will be to create a Security Portfolio with the following sections:

1. Cover Page

2. Background (provide a synopsis your midterm security assessment on Vestige)

3. For each security need identified (or needs to be identified) from your Midterm Assignment, Find the products that will deliver the needed capabilities for the right price, and tell why you chose that product.

Reference no: EM133067109

Questions Cloud

What is the efficient use of water per farmer : Consider 5 farmers located close to a lake. The lake is used by 5 recreational users for swimming. The farmers use fertilizer with marginal benefits MB = 12 - 2
What is the total interest earned : You have invested Php 20,000 at interest rate of 0.013 percent per day, compounded daily for a period of January 1, 2020 to December 31, 2025.
The lan-to-wan and wan domains : Discuss LAN-to-WAN traffic and performance monitoring and analysis. Discuss remote access domain best practices
What did they do to make you think they were effective : What were their top 3 skills or strengths that made them effective - What did they do to make you think they were effective
Thoughts and understanding of requirements : Who consumes requirements? Why do good requirements go bad?
What are the alternatives to discounted cash flows : Question - What are the alternatives to discounted cash flows? Evaluate the advantages and disadvantages of each alternative
Define gdp in broad terms : 1. What two important functions are performed by the price system?
Business environment and impacts for managers : Environment Analysis and Actions for Managers Discussion - explore the business environment and impacts for managers
Costs and benefits of economic growth? in jamaica : Explain what are some of the costs and benefits of economic growth? in Jamaica?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Sketch the input and output timing waveforms

For a 3-to-8 decoder with high outputs and an active high enable line (EN): a) List the truth table: b) write the boolean equations: c) sketch the input and output timing waveforms for all input combinations.

  Describe advantages and disadvantages of magnetic storage

In a 3 pages paper and double space describe the advantages and disadvantages of magnetic storage, optical storage, and solid state storage using criteria such as versatility, durability, capacity, access time, and transfer rate.

  Controlled or natural setting usability study

What do you believe is the most effective way to avoid usability study bias when conducting a controlled or natural setting usability study?

  Background and culture influence a person decision-making

How does a person's background and culture influence a person's decision-making?

  Program for an atm machine to perform

Write a program for an ATM machine to perform the following tasks:

  What is the maximum pressure drop allowed

Water flows through a horizontal 1-mm-diameter tube to which are attached two pressure taps a distance 1 m apart. What is the maximum pressure drop allowed if the flow is to be laminar?

  Interesting information contained in that privacy policy

You are asked to locate any company privacy policy. explain what you find to be the most interesting information contained in that privacy policy.

  Jim develops 5 java applications a year

Jim develops 5 Java applications a year. Joe develops 10 Java applications a year. Jim gets paid $5000.00 per application, but Joe gets paid $10000.00 per application.

  How does the use of backup sites affect each

How does the use of backup sites affect each?

  The ICMP protocol provides number of functionalities

The ICMP protocol provides a number of functionalities that enable network designers to analyze whether the network has been set up and designed properly.

  Machine learning is improving work in business

Based on How Machine Learning Is Improving Work in Business, Discuss the opportunities of improving human resource management.

  How collaboration tools can improve team communication

Discuss how collaboration tools can improve team communication. Discuss how this new collaboration IS could provide competitive advantages for your organization

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd