Tuesday, March 5, 2019
Identify potential weaknesses from either the Aircraft Solutions or Quality Web Design Company Essay
In this stagecoach you will postulate either Aircraft Solutions or Quality Web Design as the society you will work with. The scenarios are in Doc Sharing in the course of study Project select area. You will then identify dominance surety weaknesses.Security weaknesses You mustiness choose two from the following tierce areas ( hardware, software, and constitution excluding password policies) and identify an item that requires improved security.To define the plus or form _or_ system of government with sufficient detail to justify your assessment, your assessment must include* the vulnerability associated with the plus or policy* the possible threats against the asset or policy* the likelihood that the threat will occur (risk)* the consequences to committee critical phone line processes should the threat occur * how the organizations free-enterprise(a) edge will be affected should the threat occurTo light up an item that requires improved security, you must identify o ne of these items* one hardware and one software weakness* one hardware and one policy weakness* one software and one policy weakness other indispensable elements include* Cover sheet* APA-style* In-text citations and Reference section* minimum space 3 pages, maximum length 5 pages (not counting accost sheet,diagram(s), reservoirs). Do not exceed the maximum length.Phase II the Course Project (comprised of Phase I and II) Recommend solutions to the potentiality weaknesses from either the Aircraft Solutions or Quality Web Design CompanyIn this phase of the offer you will include Part I (presumably improved as take based upon Week 3 feedback) and then you will recommend solutions for the security weaknesses you identified in the Phase I.Definition of the solution Hardware solutions must include vendor, major specifications with an emphasis on the security features, and location of military position with diagram. Software solutions must include vendor and major specification s, with an emphasis on security features. Policy solutions must include the complete portion of the policy that addresses the weakness identified. Any outsourced solution must include the above detail and the critical elements of the service level agreement.Justification You must address the efficaciousness of the solution in terms of the identified threats and vulnerabilities the cost of the solution, including its purchase (if applicable) and its implementation, including procreation and maintenance.Impact on craft processes You must discuss any potential positive or negative effects of the solution on business processes and discuss the need for a trade-off between security and business requirements using quantitative rather than simply qualitative statements.Other required elements include* Cover sheet* APA-style* In-text citations and Reference section* 5 reference minimum* Minimum length of solutions 6 pages, maximum length 10 pages (not countingcover sheet, diagram(s), r eferences). Do not exceed the maximum lengthP.S. Phase 1 is done and attached. Just need help with phase 2.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment