What really matters is how this knowledge can be used to

Assignment Help Computer Graphics
Reference no: EM13383042

What really matters is how this knowledge can be used to identify and remediate real-world security issues. What you learn in this course should be directly applicable to your work environment. The course project that you will complete is designed to further this goal. In the first part of the project you will choose an organization from one of two given scenarios (below), identify potential security weaknesses, and in the second part of the project, you will recommend solutions.

Phase I

In phase you will choose either Aircraft Solutions or Quality Web  Design as the company you will work with. You will then identify potential security weaknesses.

Security weaknesses - You must choose two from the following three areas:

  • hardware
  • software
  • policy (excluding password policies)

and identify an item that requires improved security. To clarify: you must identify

a) one hardware and one software weakness or,
b) one hardware and one policy weakness or,
c) one software and one policy weakness.

You must define the asset or policy with sufficient detail to justify your assessment. Your assessment must include:

  • the vulnerability associated with the asset or policy
  • the possible threats against the asset or policy
  • the likelihood that the threat will occur (risk)
  • the consequences to mission critical business processes should the threat occur
  • how the organization's competitive edge will be affected should the threat occur

Phase II

In this phase of the project you will include Phase I and then you will recommend solutions for the security weaknesses you identified in the phase I.

Definition of the solution - Hardware solutions must include vendor, major specifications with an emphasis on the security features, location of placement with diagram. Software solutions must include vendor, major specifications with an emphasis on security features. Policy solutions must include the complete portion of the policy that addresses the weakness identified. Any outsourced solution must include the above details and the critical elements of the service level agreement.

Justification - You must address the efficacy of the solution in terms of the identified threats and vulnerabilities, the cost of the solution including its purchase (if applicable) and its implementation including training and maintenance.

Impact on business processes - You must discuss any potential positive or negative effects of the solution on business processes and discuss the need for a trade-off between security and business requirements using quantitative rather than simply qualitative statements.

Reference no: EM13383042

Questions Cloud

With the ongoing emphasis on being financially responsible : with the ongoing emphasis on being financially responsible the government often implements the rfp process to attain
Imagine that you are working on a two-million-dollar : imagine that you are working on a two-million-dollar procurement for the purchase of vehicles for the fleet of trucks
Explain how descriptive statistics are related to data : explain how descriptive statistics are related to data distribution graphs and how effective this qualitative method is
Part a major change definition and facilitating : part a major change definition and facilitating forces1.discuss the differences between a voluntary change and an
What really matters is how this knowledge can be used to : what really matters is how this knowledge can be used to identify and remediate real-world security issues. what you
Many people would like to have their own business if you : many people would like to have their own business. if you were to start your own small business why would you take on
What are the four types of corporations what makes each : what are the four types of corporations? what makes each corporation different? what are advantages and disadvantages
Worldwide advertising inc referred to as wai has hired you : worldwide advertising inc. referred to as wai has hired you as an it consultant for implementing their windows network
What are the four types of business ownership describe each : what are the four types of business ownership? describe each of them. your response should be at least 200 words in

Reviews

Write a Review

Computer Graphics Questions & Answers

  Explain the use of web standards

Describe the use of web standards. Why are they important when designing and developing websites? List three examples of these standards and discuss how they are used.

  Task in this lab you will develop the following image

task in this lab you will develop the following image manipulations that can be performed on a user-specified image.

  When can restructuring be seen as a positive corporate

when can restructuring be seen as a positive corporate strategic move? explain how shareholder value is created through

  Selecting bit mapped or vector graphics

For each of the provide a detailed rational for selecting bit mapped or vector graphics when they used in a web based application,

  Write a program that allows the user to verify entry

If it matches, the program should report success and end; otherwise the program should report that the code entered is incorrect, and then start over from the beginning.

  How many minutes of uncompressed digital video can be stored

Approximately how many minutes of uncompressed digital video could be stored and played from a standard (single-speed) CD-ROM at 640 X 480 resolution using 256 colors?

  How to choose the particular approach

For each one justify why you would choose the particular approach and what advantages / disadvantages there might be.

  Create a set of criteria for assessment of video clips

Create a set of criteria for assessment of video clips suitable for inclusion in Multimedia presentations over the web.

  Build agraphical user interface for a text editor

Using BlueJ, Design and build aGraphical user interface for a text editor. Users should be able to enter text,edit, scroll, etc. Consider functions for formatting (font faces, style, andsize) and a character/word-count function.

  Develop a grayscale image consisting of grid

Develop a grayscale image consisting of an 8 x 8 grid with vertical line in the first column. Compress into JPEG format and decompress.

  What does resolution mean

What does resolution mean How is resolution connected to ppi and dpi units

  Ethernet equipment to modernize the network

An older network using ten baseT technology needs an upgrade. The network haves a total of 220 workstations and ten servers and has a network diameter of three-hundred meters.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd