Trade-off between security and business requirements

Assignment Help Strategic Management
Reference no: EM13223701

What really matters is how this knowledge can be used to identify and remediate real-world security issues. What you learn in this course should be directly applicable to your work environment. The course project that you will complete is designed to further this goal. In the first part of the project you will choose an organization from one of two given scenarios (below), identify potential security weaknesses, and in the second part of the project, you will recommend solutions.

Phase I

In phase you will choose either Aircraft Solutions or Quality Web  Design as the company you will work with. You will then identify potential security weaknesses.

Security weaknesses - You must choose two from the following three areas:

  • hardware
  • software
  • policy (excluding password policies)

and identify an item that requires improved security. To clarify: you must identify

a) one hardware and one software weakness or,
b) one hardware and one policy weakness or,
c) one software and one policy weakness.

You must define the asset or policy with sufficient detail to justify your assessment. Your assessment must include:

  • the vulnerability associated with the asset or policy
  • the possible threats against the asset or policy
  • the likelihood that the threat will occur (risk)
  • the consequences to mission critical business processes should the threat occur
  • how the organization's competitive edge will be affected should the threat occur

Phase II

In this phase of the project you will include Phase I and then you will recommend solutions for the security weaknesses you identified in the phase I.

Definition of the solution - Hardware solutions must include vendor, major specifications with an emphasis on the security features, location of placement with diagram. Software solutions must include vendor, major specifications with an emphasis on security features. Policy solutions must include the complete portion of the policy that addresses the weakness identified. Any outsourced solution must include the above details and the critical elements of the service level agreement.

Justification - You must address the efficacy of the solution in terms of the identified threats and vulnerabilities, the cost of the solution including its purchase (if applicable) and its implementation including training and maintenance.

Impact on business processes - You must discuss any potential positive or negative effects of the solution on business processes and discuss the need for a trade-off between security and business requirements using quantitative rather than simply qualitative statements.

Reference no: EM13223701

Questions Cloud

Use binomial distribution : What are the four properties that must be present in order to use binomial distribution?
Which curve will shift of the per-burger tax and why : Which of the following curves- average fixed cost, average variable cost, average total cost, and marginal cost- would shift as a result of the lump-sum tax Why Show this in a graph. Label the graph as precisely as possible.
Explain the portion of heat energy lost to the calorimeter : Suppose the calorimeter for this experiment had been made of a heat-conducting material (such as metal) rather than plastic foam, so that the portion of heat energy lost to the calorimeter itself was larger and could not be ignored
Use bayes theorem to find the probability : Compare the result in (a) to the probability that a fatality involved a rollover and comment on whether SUVs, Vans, and pickups are generally more prone to rollover accidents that other vehicles.
Trade-off between security and business requirements : Discuss any potential positive or negative effects of the solution on business processes and discuss the need for a trade-off between security and business requirements using quantitative rather than simply qualitative statements.
Calculate investment and equilibrium real interest rate : Where r = equal to Ecoland's real interest rate. Calculate, then explain, the following:  Private saving  Public saving  National saving  Investment  The equilibrium real interest rate The government uses the following equation for the investment fun..
What would be his expected procurement cost : Suppose Handi were to procure exclusively from the spot market? What would be his expected procurement cost? What would be his fill - rate in this arrangement? Also, what is the mismatch cost he incurs with this arrangement?
Explain the initial concentration of sucrose in the solution : The reaction is first order and has a rate constant of 6.2 ? 10-5 /s at 35?C when the H+ concentration is 0.10 M. Suppose that the initial concentration of sucrose in the solution is 0.40 M. How many minutes will it take for the sucrose concentrat..
Describe three learning theories in depth : Describe three learning theories in depth and contrast and compare their strengths and applications. Discuss how these theories impact workflow processes.

Reviews

Write a Review

Strategic Management Questions & Answers

  Describe the competitive rivalry

Identify and describe the competitive rivalry that Nintendo can anticipate in its business units.

  Characteristics of organizational culture

Describe the key characteristics of organizational culture. Your response should be at least 125 words in length. All sources used, including the textbook,

  Case study in strategic plan adelphi art centre

Strategic plan or strategic planning of  Adelphi Art Centre in Adelphi, Australia.

  Identify and discuss strategic capabilities

Identify and discuss strategic capabilities of the chosen company using appropriate strategy tools and identify strengths and weaknesses for the firm.

  Developing a television ad

What other things need to be considered when developing a television ad in order for it to be effective?

  Provide a brief overview of the composition

Provide a brief overview of the composition of its strategic plan.

  Explain the role that opening offers, target, and resistance

Explain the role that opening offers, target, and resistance points play in claiming value in an organization. Use specific examples in your response.

  Appropriate depth and breadth

How does your organization [Wal-Mart] distribute its product?

  Develop a similar table to show the effects of operations

Develop a similar table to show the effects of adding operations on Saturday. (Assume that 30 operations would still be performed each day.) How would this affect the utilization of the bed capacity? Is this capacity sufficient for the additional pat..

  Backup and security practices

How important is backing up your data to you? What steps do you take or will you take to keep your computer safe and secure? Be thorough and specific in your plans. Include your resources.

  Two broad goals of a sound compensation plan

Two broad goals of a sound compensation plan.

  The interpersonal relationships in the workplace important

Why are interpersonal relationships in the workplace important?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd