Reference no: EM131145514
The case study company provided a situation in which threats pose a real risk to the infrastructure.
The company assets are not well-protected, and they all share a common network. Little additional security mechanisms are in place other than the demilitarized zone (DMZ).
What are typical information security (IS) assets that are used by such a company, and what risks exist in the current model?
What will adding a flexible solution for the consultants to connect to the network do to this risk model? What are some safeguards that can be implemented to reduce the risk?
The tasks for this assignment are to identify the major applications and resources that are used by the company.
Then, for each application, review the security threats that the company now faces and could face after the expansion.
Describe how you can test for the presence of these (or new) risks? Provide a discussion about an approach that you will take after the risk assessment is complete to address the identified risks.
Create the following section for Week 2:
Week 2: Security Assessment
A description of typical assets
A discussion about the current risks in the organization with no network segregation to each of the assets
A discussion about specific risks that the new consultant network will create
Details on how you will test for risk and conduct a security assessment
A discussion on risk mitigation
Case analysis - harley-davidson inc
: Case Analysis: Harley-Davidson Inc. in May 2015, Read the case, "Harley-Davidson Inc. in May 2015" on page 502-514. Use the case analysis format provided below to identify and address the problems and provide several suggested solutions that the H..
|
Develop a chart that shows the project
: Prepare a list showing all tasks and their durations - Analyze the fact situation carefully to determine which tasks are concurrent and which ones are dependent on other tasks.
|
Calculate the equilibrium number of firms in the u.s.
: Calculate the equilibrium number of firms in the U.S. and European automobile markets without trade.
|
Explain why this contract is governed by common law
: Describe and analyze the five elements of a contract that must exist for this agreement to be enforceable. Explain why this contract is governed by common law or the Uniform Commercial Code (UCC).
|
What will adding a flexible solution for the consultants
: What will adding a flexible solution for the consultants to connect to the network do to this risk model? What are some safeguards that can be implemented to reduce the risk?
|
Calculate the effective annual yield
: Hacker Software has 6.2 percent coupon bonds on the market with 9 years to maturity. The bonds make semi-annual payments and currently sell for 105 percent of par. What is the current yield on the bonds? Calculate the YTM. Calculate the effective ann..
|
How online shopping carts or mobile purchases differ
: An analysis of the various types of customer service options available (help/FAQ, chat functionality, email, phone, hours, etc.) and how these options satisfy different types of customers and consumer needs
|
Discuss the steps and/or actions you can take to validate
: Rate, from the best to the worst, each of the sources you indicated in #1 above as being sources you will use in your analysis in terms of its probable reliability. Discuss the steps and/or actions you can take to validate the reliability and accurac..
|
Write a program to calculate students average test scores
: Write a program to calculate students average test scores and their grades - a method to read and store data into two arrays, a method to calculate the average test score and grade and a method to output the results.
|