What really matters is how this knowledge can be used to

Assignment Help Computer Graphics
Reference no: EM13383042

What really matters is how this knowledge can be used to identify and remediate real-world security issues. What you learn in this course should be directly applicable to your work environment. The course project that you will complete is designed to further this goal. In the first part of the project you will choose an organization from one of two given scenarios (below), identify potential security weaknesses, and in the second part of the project, you will recommend solutions.

Phase I

In phase you will choose either Aircraft Solutions or Quality Web  Design as the company you will work with. You will then identify potential security weaknesses.

Security weaknesses - You must choose two from the following three areas:

  • hardware
  • software
  • policy (excluding password policies)

and identify an item that requires improved security. To clarify: you must identify

a) one hardware and one software weakness or,
b) one hardware and one policy weakness or,
c) one software and one policy weakness.

You must define the asset or policy with sufficient detail to justify your assessment. Your assessment must include:

  • the vulnerability associated with the asset or policy
  • the possible threats against the asset or policy
  • the likelihood that the threat will occur (risk)
  • the consequences to mission critical business processes should the threat occur
  • how the organization's competitive edge will be affected should the threat occur

Phase II

In this phase of the project you will include Phase I and then you will recommend solutions for the security weaknesses you identified in the phase I.

Definition of the solution - Hardware solutions must include vendor, major specifications with an emphasis on the security features, location of placement with diagram. Software solutions must include vendor, major specifications with an emphasis on security features. Policy solutions must include the complete portion of the policy that addresses the weakness identified. Any outsourced solution must include the above details and the critical elements of the service level agreement.

Justification - You must address the efficacy of the solution in terms of the identified threats and vulnerabilities, the cost of the solution including its purchase (if applicable) and its implementation including training and maintenance.

Impact on business processes - You must discuss any potential positive or negative effects of the solution on business processes and discuss the need for a trade-off between security and business requirements using quantitative rather than simply qualitative statements.

Reference no: EM13383042

Questions Cloud

With the ongoing emphasis on being financially responsible : with the ongoing emphasis on being financially responsible the government often implements the rfp process to attain
Imagine that you are working on a two-million-dollar : imagine that you are working on a two-million-dollar procurement for the purchase of vehicles for the fleet of trucks
Explain how descriptive statistics are related to data : explain how descriptive statistics are related to data distribution graphs and how effective this qualitative method is
Part a major change definition and facilitating : part a major change definition and facilitating forces1.discuss the differences between a voluntary change and an
What really matters is how this knowledge can be used to : what really matters is how this knowledge can be used to identify and remediate real-world security issues. what you
Many people would like to have their own business if you : many people would like to have their own business. if you were to start your own small business why would you take on
What are the four types of corporations what makes each : what are the four types of corporations? what makes each corporation different? what are advantages and disadvantages
Worldwide advertising inc referred to as wai has hired you : worldwide advertising inc. referred to as wai has hired you as an it consultant for implementing their windows network
What are the four types of business ownership describe each : what are the four types of business ownership? describe each of them. your response should be at least 200 words in

Reviews

Write a Review

Computer Graphics Questions & Answers

  Create a simple warm-up program using your g3d

Create a simple warm-up program using your G3D programming and graphics environment.

  Shadow effect while rolling a sphere

Shadow effect while rolling a sphere as well as the options of shading and lighting.

  Relative positioning and interactive positioning

Relative Positioning and Interactive Positioning by Dragging and Clicking and some Simple Animation

  Draw a teapot at the global origin

Draw a teapot at the global origin

  Concepts of computer graphics

Concepts of Computer Graphics and develop a program using OpenGL

  The security policy document outline

Using the GDI Case Study below, complete the Security Policy Document Outline

  Develop the image manipulations

Develop the image manipulations

  What does resolution mean

What does resolution mean How is resolution connected to ppi and dpi units

  Differentiate between a bitmap image and a vector image

Differentiate between a bitmap image and a vector image Explain the following terms

  Essential elements of a design pattern

configuration of an Iterator pattern, patterns could be used in a Library System, Singleton, Template, Decorator, Façade,What does Alexander means by the following declaration "But it is impossible to form anything which has the temperament of natu..

  Framework of user interface design

design of user interfaces, natural mapping, GUI applications, web page design different to designing for printed media, risks exposed in this "phone as individual proxy" approach, interaction designers of ubicomp applications, Storyboards are usual..

  What are the factors affecting picture composition

Define picture composition What are the factors affecting picture composition. Elaborate on each factor Describe the basic lines present in a composition

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd