Ientify and provide an assessment of the risks associated

Assignment Help Computer Engineering
Reference no: EM13462822

A new client of your security consulting firm is worried about the potential for data leaks that could expose it to financial losses as well as a damaged reputation. The client recently read a front-page story about a negligence lawsuit arising out of a data leak that exposed confidential client information. The source of the data leak was a peer-to-peer file sharing application that had been installed on an employee's desktop computer. An initial quick-look security assessment found that your client's concerns were well founded. At least one department was using a similar peer-to-peer file-sharing application to distribute promotional videos and audio podcasts to potential customers. Your team leader has asked you to prepare a short technology evaluation paper in which you address one of the problem areas  identified in the quick-look assessment:

  1. Data: Identify and provide an assessment of the risks associated with collection, processing, and storage of confidential client information .
  2. Software: Identify and provide an assessment of the risks associated with unauthorized installation of file-sharing software on company computers, including servers, desktops, and laptops.

Research and evaluate three or more technology-based solutions that could provide effective protection measures. Use one row per technology solution.

Your technology evaluation paper must begin with an executive summary followed by your technology evaluation matrix. The executive summary should provide an overview of your risk assessment and evaluation. It should also provide additional information to help the client understand your recommended solution. Your summary should be concise-approximately three pages long-and include the following elements:

  • an explanation of the information security threats and vulnerabilities associated with your selected option
  • a comparison of the capabilities and weaknesses of the candidate technology-based solutions
  • a recommendation of the best fit technology-based solution to solve/mitigate the problem associated with your selected option

 

Reference no: EM13462822

Questions Cloud

What is the url name and dotted quad ip address of an : the current ip address standard is 32 bits. ipv6 will increase the address length to 128 bits. an ip socket address
Explain fictitious client not a real person who suffers : describe a fictitious client not a real person who suffers from one of the mental illnesses you read about this week
Many phone companies are replacing the wire in their phone : many phone companies are replacing the wire in their phone systems with fiber optic cable. what do they expect to gain
Address the physical safety of guests staying in a hotel in : write a 350- to 700-word paper explaining the need for hotel security. include the following middot address the
Ientify and provide an assessment of the risks associated : a new client of your security consulting firm is worried about the potential for data leaks that could expose it to
Describe pulse code modulation phase shift modulation : 1. describe pulse code modulation phase shift modulation amplitude modulation and frequency modulation. indicate how
Why is it so important to measure change as a psychology : why is it so important to measure change? as a psychology major will your goal always be to change behavior? what
Describe the history or background of the illness : write a 1300- to 1650-word paper including the following middot explain the history or background of the illness
What types of devices are available today to secure a : write a 2-4 page paper on network security your paper should include the following topicsmiddot how a secure

Reviews

Write a Review

Computer Engineering Questions & Answers

  Integrate the research and analysis from the previous

one of the most common business tools during organizational assessment is the strengths weaknesses opportunities and

  Questionyour company has a benchmark that is considered

questionyour company has a benchmark that is considered representative of your typical applications. an embedded

  Improving the response to disaster

Also determine if you may find how the plans helped officials improve the response to disaster. How do the plans help the recovery?

  Describe the role of the information technology

as a software engineer you have been asked to write a paper that describes the use of current technologies with regard

  Three concerns dealing with internet security and privacy

identify and define three concerns dealing with Internet security and privacy?

  Why both support pass-by-reference and pass-by-value

For primitive data types, C# implements pass-by-value as the default.although , VB6.0 implements the pass-by-reference as the default. They both support pass-by-reference and pass-by-value.

  Find the benefits of the two when developing a compiler

What is the difference between top-down and bottom-up parsing? What are the benefits of the two when developing a compiler? What are the disadvantages.

  Requirement 1complete the 4 step process for designing

requirement 1complete the 4 step process for designing dimensional models for each process you identify.1.business

  Addressing and naming model

Sketch a plan for development of the addressing and the naming model in an environment of following given scenario: Ten (10) departments in the 1,000-employee organization. Equal separation by geography

  Requirements for telecommunications planning

Discuss what do you understand by the general estimate requirements for the enterprise telecommunications planning and also explain in detail the cable estimating procedures.

  Make a stack area at 1000h

Push 10h bytes, located at data memory addresses 60000h to 6000fh, on the stack using indirect addressing. Then pop stack to memory addresses 62000h to 6200fh using indirect addressing. Load unique data into the 10h bytes in order to test the prog..

  Define problem with criteria range

problem with criteria range. I do not know how to set two different criterias in one column. I need to ADVANCE FILTER all of the Clerks (1 and 2) and the Sect. 1 workers who create more than $5.50/hr. I do not understand how to set the title crite..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd