Security weaknesses

Assignment Help Computer Network Security
Reference no: EM13754047

Security Assessment and Recommendations

Overview

This course does involve a lot of technical information and theory but, what really matters is how this knowledge can be used to identify and remediate real-world security issues. What you learn in this course should be directly applicable to your work environment. The course project that you will complete is designed to further this goal. In the first part of the project you will choose an organization from one of two given scenarios (below), identify potential security weaknesses, and in the second part of the project, you will recommend solutions.

Phase I

In this phase you will choose either Aircraft Solutions or Quality Web Design as the company you will work with. You will then identify potential security weaknesses.

Security weaknesses - You must choose two from the following three areas:
· hardware
· software
· policy (excluding password policies)

and identify an item that requires improved security. To clarify: you must identify
a) one hardware and one software weakness or,

b) one hardware and one policy weakness or,

c) one software and one policy weakness.

You must define the asset or policy with sufficient detail to justify your assessment. Your assessment must include:

· the vulnerability associated with the asset or policy
· the possible threats against the asset or policy
· the likelihood that the threat will occur (risk)
· the consequences to mission critical business processes should the threat occur
· how the organization's competitive edge will be affected should the threat occur

Phase II

In this phase of the project you will include Phase I (presumably improved as needed based upon week 3 feedback) and then you will recommend solutions for the security weaknesses you identified in the phase I.

Definition of the solution - Hardware solutions must include vendor, major specifications with an emphasis on the security features, location of placement with diagram. Software solutions must include vendor, major specifications with an emphasis on security features. Policy solutions must include the complete portion of the policy that addresses the weakness identified. Any outsourced solution must include the above details and the critical elements of the service level agreement.

Justification - You must address the efficacy of the solution in terms of the identified threats and vulnerabilities, the cost of the solution including its purchase (if applicable) and its implementation including training and maintenance.

Impact on business processes - You must discuss any potential positive or negative effects of the solution on business processes and discuss the need for a trade-off between security and business requirements using quantitative rather than simply qualitative statements.

Reference no: EM13754047

Questions Cloud

When referring to a note receivable or promissory note : When referring to a note receivable or promissory note:
Current assets are usually listed in order : Current assets are usually listed in order
Write-off method of accounting for uncollectible accounts : Under the direct write-off method of accounting for uncollectible accounts, Bad Debts Expense is debited
Members of controlled group share but which tax attribute : Members of a controlled group share all but which tax attribute?
Security weaknesses : In this phase you will choose either Aircraft Solutions or Quality Web Design as the company you will work with. You will then identify potential security weaknesses
Discuss the development of a divided nation on vietnam war : Identify and discuss the development of a divided nation and culture during the 1960's-70' with an emphasis on the Vietnam War.
Compute the groups charitable contribution deduction : ParentCo's separate taxable income was $350,000, and SubCo's was $225,000. Consolidated taxable income before contributions was $400,000. Charitable contributions made by the affiliated group included $15,000 by ParentCo and $20,000 by SubCo. Compute..
Corporation is not eligible for consolidated return status : Which corporation is not eligible for consolidated return status?
Calculate the monthly mortgage payment of principal : Calculate the monthly mortgage payment of principal and interest for the a loan with an initial balance of 150,000, an annual stated interest rate of 6%, and 30 years to maturity. Use Excel to develop this response and present your result within a..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Financial organization managing routine administrative

An organization managing public information on its Web server and a law enforcement organization managing extremely sensitive investigative information.

  Decrypt the following message which was enciphered using

1 decrypt the following message which was enciphered using the vigenere cipher with encrypting key secret wbrcs lazgj

  Dissect an email

Dissect an email you have received. First, get the original, ASCII text of the email, including the headers, and the blank line separating the headers and the body of the email.

  What firewall type or methodology or system would you

what firewall typemethodology or system would you recommend for a small 10-user it shop running windows systems

  An information security changes required in the environment

A description of how you will provide disaster recovery in this infrastructure. A discussion of the information security changes required in this environment and the steps taken to monitor and control these changes

  System enforcing bibas strict integrity policy

Consider the system enforcing Biba's strict integrity policy for a software vendor - defined integrity levels for an access class are released

  Limited management abilities

Originally Linux/UNIX systems had one all-powerful user called root that managed systems and discuss the risks of having a single root user and how more limited management abilities can be given to others users on Linux/UNIX systems.

  Digital stratigraphy

concept of Message Digest, File Carving, MD5, Locard's Exchange, Parker's categories, computer-related crime as suggested by Donn Parker, computer systems as sources of digital evidence

  Improving the security of the current network

The plan includes improving the security of the current network and establishing a secure environment for data exchange between the headquarters (Brisbane) and other offices.

  Describe the organizational authentication technology

Identify and describe the organizational authentication technology and network security issues and make a list of access points internal and external (remote).

  Secure communication if organization uses symmetric cipher

An organization has 300 members. It is desired that each member of the organization be able to communicate securely with any other member. The organization uses a symmetric cipher.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd