.

Wednesday, January 16, 2019

Identify potential weaknesses from either the Aircraft Solutions or Quality Web Design Company Essay

In this phase you testament choose either Aircraft Solutions or Quality clear Design as the company you will unravel with. The scenarios are in Doc Sharing in the Course intention select area. You will then identify potential security weaknesses. credential weaknesses You essential choose two from the following three areas (hardware, software package, and insurance excluding countersignature policies) and identify an item that requires improve security.To define the asset or constitution with sufficient detail to justify your assessment, your assessment must overwhelm* the picture associated with the asset or policy* the possible threats against the asset or policy* the likelihood that the threat will occur (risk)* the consequences to mission critical short letter processes should the threat occur * how the organizations competitive edge will be affected should the threat occurTo clarify an item that requires improved security, you must identify maven of these items* o ne hardware and one software weakness* one hardware and one policy weakness* one software and one policy weaknessOther required elements involve* conduct sheet* APA-style* In-text citations and Reference section* stripped length 3 pages, maximum length 5 pages (not counting dwell sheet,diagram(s), references). Do not exceed the maximum length. descriptor II the Course Project (comprised of Phase I and II) Recommend solutions to the potential weaknesses from either the Aircraft Solutions or Quality Web Design CompanyIn this phase of the project you will include Part I (presumably improved as ingested based upon calendar week 3 feedback) and then you will recommend solutions for the security weaknesses you identified in the Phase I.Definition of the solution Hardware solutions must include vendor, major(ip) specifications with an emphasis on the security features, and location of placement with diagram. Software solutions must include vendor and major specifications, with an e mphasis on security features. form _or_ system of government solutions must include the complete portion of the policy that addresses the weakness identified. any(prenominal) outsourced solution must include the above details and the critical elements of the benefit level agreement.Justification You must address the efficacy of the solution in terms of the identified threats and vulnerabilities the cost of the solution, including its purchase (if applicable) and its implementation, including training and maintenance.Impact on business processes You must discuss any potential positive or negative effects of the solution on business processes and discuss the need for a trade-off between security and business requirements using three-figure rather than simply qualitative statements.Other required elements include* Cover sheet* APA-style* In-text citations and Reference section* 5 reference minimum* Minimum length of solutions 6 pages, maximum length 10 pages (not countingcover sh eet, diagram(s), references). Do not exceed the maximum lengthP.S. Phase 1 is done and attached. Just need help with phase 2.

No comments:

Post a Comment