Create and implement effective policies to mitigate risks

Assignment Help Computer Engineering
Reference no: EM132448472

Question: The objective is to present a Bid Response Proposal that provides a security solution for any business process of your choice. The financial business has 60 employees and is struggling with security issues both internal and external. Employees use laptops and have remote access to the office systems. Your Bid Response needs to be a turnkey solution that will provide a solution to but not limited to the following problems (so be creative):

1) Equipment is disappearing

2) No building or computer room security.

3) No policies (AUP)

4) No virus protection and experiencing viruses daily

5) No intrusion detection and experiencing intrusions daily

6) Passwords compromised

7) There is an Internet connection but no protection and content filtering

8) Sensitive information is being copied from systems

9) If a disaster should happen to the building there are no plans to recover

Minimum topics to be included in your Bid Response Proposal are the following:

1. Deliver a Bid Response Proposal to provide a business security solution to prevent malicious or unauthorized use of digital assets

2. Create and implement effective policies to mitigate risks

3. Deliver a detailed list of security products and pricing

4. Provide safeguards for the information assets

Format: Format for the project should be a 15-20 slide PowerPoint presentation with a budget sheet.

Reference no: EM132448472

Questions Cloud

Creating new ideas for the athletic department : In this module, you will write the second of the three business memos that you will write for the course. Creating new ideas for the athletic department.
Explain why the companys stock appears to be over : Determine whether your company appears to be correctly valued, overvalued, or undervalued based on your company's stock current price and model result.
Create proposal for new product in chief marketing officer : Create proposal for new product in chief marketing officer,would like to pursue to generate growth for your organization.three potential opportunities you would
Why the business needs to drive the IG strategy : Why the business needs to drive the IG strategy and why there must constantly be an alignment. How would you approach implementing an IG strategy
Create and implement effective policies to mitigate risks : The financial business has 60 employees and is struggling with security issues both internal and external. Employees use laptops and have remote access.
Describe situation believe using a swot analysis useful : Explain how you would roll it out. SWOT is an acronym that stands for Strengths, Weaknesses, Opportunities and Threats.Describe situation believe using a SWOT
Describing iam in a federated cloud application : Write an essay of at least 500 words discussing discussing IAM in a federated cloud application. Use the five paragraph format. Each paragraph must have.
Describe how operations security in current job : Describe how you do or could use operations security in your current job. Be sure to describe your job role (or desired job role)
What are the essential ingredients of a public-key directory : What are two different uses of public-key cryptography related to key distribution? What are the essential ingredients of a public-key directory?

Reviews

Write a Review

Computer Engineering Questions & Answers

  What is the purpose of a document management system

Software introduce ability do you have a document management system to manage business processes.

  Write a program that reads in two sparse matrices and stores

We are assuming that the matrices are too large to fit into memory as arrays, thus all calculations must be carried out with the matrices stored in their linked list format.

  How could gm use game theory to identify major risks

Chapters 30, 31, and 34 presented three mini-case studies on ERM and risk. Each one presented a slightly different risk scenario. Suppose General Motors wants.

  Write a program to perform the given operation

The Last National Bank has two branches, each of which uses a sequential containing a summary of customers' account. Write a program to perform this operation.

  What is the annualized rate of occurrence

What is the Annualized Rate of Occurrence (ARO)? What is the calculated Annualized Loss Expectancy (ALE)?

  How do you look at a visual representation of a binary tree

How do you look at a visual representation of a binary tree (the diagram starting with root and ending with leaves) and determine how many levels it has?

  What are the main considerations in processing big data

Discuss the three characteristics of Big Data, and what are the main considerations in processing Big Data? The response must be typed, single spaced.

  Implement a multilayer perceptron classifier

Using this dataset, implement a Multilayer Perceptron Classifier (MLP) to predict whether an article is popular or not

  What is steady-state cpi

What is steady-state CPI

  Write a program using plp tool

Write a program using PLP Tool (Progressive Learning Platform) in such that it repeatedly reads the value of the switches (address: 0xf0100000) .

  Discuss the implementation of global cybersecurity policy

addressed above and discuss the interconnectedness of these issues surrounding the implementation of global cybersecurity policy

  Print the adjacency matrix of the graph

Write a program that implements a backtracking algorithm that solves the m-Coloring Problem as presented in class and given in your text.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd