1 risk assessment of ict systemperform risk assessment for

Assignment Help Computer Engineering
Reference no: EM13347026

1. Risk Assessment of ICT System

Perform risk assessment for the organization and it is related to ICT security threats and vulnerabilities. The final outcome is to identify :

a. critical ICT assets and their vulnerabilities;

b. to recommend measures to ensure that those ICT assets are in forensic readiness when the computer security incidents occur.

Idea is to ensure also preservation of digital evidences where it is practicable.

I need one specific example of that ICT Risk Assessment process (e.g. what are identified critical assets, how they are classified according to its threats ,impact and vulnerabilities) and what are the measures for forencis readiines after threats/vulnerabilities are identified, which will expand ideas to finalize my document-see above under a., and then recommend measures for forensic readiness-see above under b.).

2. Developing Computer Incident Response System on WAMP platform

I need help with initial programming of the system as displayed in the attachment..its about simple computer incident response system that , as per my idea, shall be universal and easily deployed elsewhere on Windows platforms. In this attempt, I would like to build it on WAMP with Apache as Webserver, My SQL as database server and PHP scripting language which I already have on my system but this is not highly constrained.

Any initial (or if you have pre-build) working system as described in attached algorithm will help me to continue tailoring/re-modifying it to my needs and I will enrich it with more scripts that will generate reports (as emails) when various security breaches occur on ICT network.

 

Reference no: EM13347026

Questions Cloud

Question 1a cantilever beam of constant cross section : question 1a cantilever beam of constant cross section carries a uniformly distributed load w nm across half its span as
1 three-person problem of points pascal fermat and their : 1 three-person problem of points pascal fermat and their old friend the chevalier de mere each put ge10.00 into a pot
Create a inventory management system in c applicationthis : create a inventory management system in c applicationthis is what the system must be able to
1 determine the value of c if any so that the system of : 1. determine the value of c if any so that the system of equations with the following augmented matrixhas the requested
1 risk assessment of ict systemperform risk assessment for : 1. risk assessment of ict systemperform risk assessment for the organization and it is related to ict security threats
Restaurant marketing leadership for this assignment you : restaurant marketing leadership for this assignment you will be evaluating mcdonalds restaurants.bullbased on the case
Part 1write a cc program to read a data file and extract : part 1write a cc program to read a data file and extract parameters. the program must obtain the filename via a
Topic-critically analyse the role of different stakeholders : topic-critically analyse the role of different stakeholders in tourism planning and policy drawing from a range of
Problem 1analyzing a current om techniquefind one scholarly : problem 1analyzing a current om techniquefind one scholarly journal article reporting on one or more of the following

Reviews

Write a Review

Computer Engineering Questions & Answers

  What does the name ajax stand for

What does the name Ajax stand for? What is Ajax, and what does it do? Give an example of how Netflix® uses Ajax, and define why this makes the Web site faster.

  Identify the three basic kinds of e-commerce

Identify the three basic sorts of e-Commerce. How do their strategic roles differ? What are the benefits and disadvantages to organizations, sellers, and consumers.

  Name and briefly describe each of these categories

Streaming video can systems can be classified into three categories. Name and briefly describe each of these categories?

  How to plan a payroll class

How to plan a PayRoll class.

  Explaining the role of cio

Assess the role of CIO within any health care organization and explain the key characteristics a CIO would require to possess to be effective in that position.

  Application showing files name-size and last modifiaction

Make a file by utilizing any word-processing program or the text editor. Write down an application which shows the file's name, size, and time of the last modification.

  Developing the java program

Write down a program in java to input the basic salary of 15 persons. Each one of them receives 25% of basic as hra (house rent allowance), 15 % of the basic as conveyance and 10 % of the basic as an entertainment allowance.

  Identify a minimum of three is or it applications

demonstrate factual knowledge, understanding and the application of technology related issues. identify a minimum of three IS or IT applications.

  Describe website design basics characteristics of design

describe website design basics characteristics of design.

  Explain how is visual basic .net different

Search for information about .NET. What is it? Read articles on Visual Basic .NET. Why do you think students should learn Visual Basic .NET? How would it be useful for students?

  What are the reasons for such a recommendation

One of business' contemporary principles states that organizations must move away from few top leaders and many managers to leaders at every level and few managers.

  Define a brief discussion of the technical aspects

Plagiarism is "cheating." It will not be tolerated and will be dealt with in accordance with University policy. Automated tools will be used to detect plagiarism and I will make deductions for minor cases, and grade the paper as a zero for major..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd