In this stage, you will select either Aircraft Solutions or Quality Web Design as the company you will be working with. The scenarios for each company can be found in the Doc Sharing section of the Course Project choice country. Additionally, you will identify potential security vulnerabilities.
In order to assess the chosen asset or policy for improved security, you must select two out of three countries mentioned (hardware, package, and policy) and identify an area that requires improvement. This evaluation should include details such as vulnerabilities associated with the asset or policy, potential threats against them, likelihood of threats occurring, impact on mission critical business processes if threats occur, and how the organization's competitive edge will be affected.
To specify an area requiring improved security, choose one hardware and one software failure, one hardware and one policy failure, or one software and one policy failure.
Othe
...r elements necessary for this assessment include a cover sheet, APA-style formatting, in-text citations, a reference section,and a minimum length of 3 pages (excluding cover sheet, diagrams,and citations). Ensure not to exceed the maximum specified length. Phase II: The Course Project (comprised of Phase I and II) – Recommending solutions to possible failings from either Aircraft Solutions or Quality Web Design Company. In this stage,you will incorporate Part I (presumptively improved based on Week 3 feedback),and provide recommendations for addressing the identified security weaknesses from Phase I.
Hardware solutions must include the seller, major specifications with an emphasis on security characteristics, and the location of arrangement with a diagram. Software solutions must also include the seller and major specifications, with an emphasis on security characteristics.
Policy solutions should incorporate a comprehensive section that addresses
the identified failure. Any outsourced solution should include the aforementioned details and essential elements of understanding the service level. Justification - it is necessary to consider the effectiveness of the solution in terms of the identified threats and vulnerabilities, as well as the cost of the solution, including its purchase if applicable, and its implementation, including training and maintenance. Impact on business processes - it is important to analyze any potential positive or negative effects of the solution on business processes and discuss the need to balance security and business requirements using quantitative rather than purely qualitative statements.
Other required elements consist of:
- Cover sheet
- APA-style
- In-text citations and Reference section
- 5 citation minimum
- Minimum length of responses: 6 pages. maximum length 10 pages (excluding cover sheet, figure(s), references). Do not exceed the maximum length.
P.
S. Phase 1 is completed and attached. I just need assistance with stage 2.
- Bankruptcy essays
- Earnings essays
- Tata Group essays
- S corporation essays
- Secretary essays
- Premise essays
- Adidas essays
- Amazon essays
- Apple essays
- Bmw essays
- British Airways essays
- Burger King essays
- Coca-Cola essays
- Company essays
- Costco essays
- Dell essays
- Ebay essays
- Enron essays
- Facebook essays
- Ford Motor Company essays
- Gap essays
- General Motors essays
- Google essays
- Honda essays
- Ibm essays
- Ikea essays
- Intel essays
- Iphone essays
- Johnson and Johnson essays
- Kellogg essays
- Key essays
- Kfc essays
- Mcdonald's essays
- Microsoft essays
- Myspace essays
- Nestle essays
- Netflix essays
- Nike essays
- Nokia essays
- Pepsi essays
- Pepsico essays
- Red Bull essays
- Ryanair essays
- Samsung essays
- Sony essays
- Southwest Airlines essays
- Starbucks essays
- Supermarket essays
- Tesco essays
- Toyota essays