Usetutoringspotscode to get 8% OFF on your first order!

  • time icon24/7 online - support@tutoringspots.com
  • phone icon1-316-444-1378 or 44-141-628-6690
  • login iconLogin

SEC 571 Course Project AIRCRAFT SOLUTION

This course does involve a lot of technical information and theory, but what really matters is how this knowledge can be used to identify and remediate real-world security issues. What you learn in this course should be directly applicable to your work environment. The course project that you will complete is designed to further this goal. In the first part of the project, you will choose an organization from one of two given scenarios (below) andidentify potential security weaknesses, and in the second part of the project, you will recommend solutions. The first part of the project is, and the second part of the project, along with the first part (presumably revised based on instructor feedback) is. This project constitutes a significant portion of your overall grade. This is an individual assignment and may not be completed in teams. Identify potential weaknesses from either the Aircraft Solutions or Quality Web Design CompanyIn this phase, you will choose either Aircraft Solutions or Quality Web Design as the company you will work with. The scenarios are in Doc Sharing in the Course Project select area.You will then identify potential security weaknesses. You must choose two from the following three areas (hardware, software, and policy excluding password policies)and identify an item that requires improved security.Todefine the asset or policy with sufficient detail to justify your assessment, your assessment must include:To clarify an item that requires improved security, you must identify one of these items:include:(comprised of Phase I and II) Recommend solutions to the potential weaknesses from either the Aircraft Solutions or Quality Web Design CompanyIn this phase of the project you will include Part I (presumably improved as needed based upon Week 3 feedback) and then you will recommend solutions for the security weaknesses you identified in the Phase I. Hardware solutions must include vendor, major specifications with an emphasis on the security features, and location of placement with diagram. Software solutions must include vendor andmajor specifications, with an emphasis on security features. Policy solutions must include the complete portion of the policy that addresses the weakness identified. Any outsourced solution must include the above details and the critical elements of the service level agreement. You must address the efficacy of the solution in terms of the identified threats and vulnerabilities; the cost of the solution, including its purchase (if applicable); and its implementation, including training and maintenance. You must discuss any potential positive or negative effects of the solution on business processes and discuss the need for a trade-off between security and business requirements using quantitative rather than simply qualitative statements.include:The course project will consist of two deliverables:(Identify potential weaknesses from either the Aircraft Solutions or Quality Web Design Company); and Phase II: thecomprised of Phases I and II Recommend solutions to the potential weaknesses from either the Aircraft Solutions or Quality Web Design Company).The grading standards for each deliverable areas follows:(Identify potential weaknesses from either the Aircraft Solutions or Quality Web Design Company)(comprised of Phase I and II) Recommend solutions to the potential weaknesses from either the Aircraft Solutions or Quality Web Design Company

You can leave a response, or trackback from your own site.

Leave a Reply

Powered by WordPress | Designed by: Premium WordPress Themes | Thanks to Themes Gallery, Bromoney and Wordpress Themes