Preview

project

Better Essays
Open Document
Open Document
914 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
project
SE571 Course Project:
Security Assessment and Recommendations
Overview
This course does involve a lot of technical information and theory but, what really matters is how this knowledge can be used to identify and remediate real-world security issues. What you learn in this course should be directly applicable to your work environment. The course project that you will complete is designed to further this goal. In the first part of the project you will choose an organization from one of two given scenarios (below), identify potential security weaknesses, and in the second part of the project, you will recommend solutions. The first part of the project is due in week 3, and the second part of the project, along with the first part (presumably revised based on instructor feedback) is due in week 7. This project constitutes a significant portion of your overall grade. This is an individual assignment and may not be completed in teams.
Phase I
In this phase you will choose either Aircraft Solutions or Quality Web Design as the company you will work with. You will then identify potential security weaknesses.
Security weaknesses – You must choose two from the following three areas: hardware software policy (excluding password policies) and identify an item that requires improved security. To clarify: you must identify
a) one hardware and one software weakness or,
b) one hardware and one policy weakness or,
c) one software and one policy weakness.
You must define the asset or policy with sufficient detail to justify your assessment. Your assessment must include: the vulnerability associated with the asset or policy the possible threats against the asset or policy the likelihood that the threat will occur (risk) the consequences to mission critical business processes should the threat occur how the organization’s competitive edge will be affected should

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Identify risks that could lead to an information security breach, Identify vulnerabilities in system security, software operation, network design or employee procedures that could lead to a network failure.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    This course covers much material about information security in a few short weeks. Whereas the subject is much deeper than what is covered in the course material, you should obtain a useful overview of how important effective information security is, and some ways it can be effectively…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    The risk analysis of an IT asset for each vulnerability comprises of evaluating the dangers and remunerating controls to focus the probability that weakness could be abused and the potential effect ought to the helplessness be misused. For managing the risk impact of a potential threats and vulnerability is to be studied first. Taking into consideration the likelihood and vulnerability risk analysis is done. Risk is proportional to both likelihood of exploitation and possible impact. The discovering and related danger level was utilized to focus the proposals that ought to be connected as a means to alleviate the danger.…

    • 640 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2010). Management of information security (3rd ed.). Boston, MA: Course Technology.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    project

    • 317 Words
    • 1 Page

    Assessment by staff, of home type classification (1-5), is a composite index of the home size, age, exposure to wind, level of insulation, and furnace type. A low home_factor index implies a lower oil consumption per degree day.• Use data in DUPREE.XLS to see whether a statistically reliable oil consumption model can be estimated from the data.…

    • 317 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Project

    • 539 Words
    • 6 Pages

    Directions: Select activities and exercises from the list below. The list is not comprehensive. Please feel free to insert activities, exercises that may not be on the list. Create a 40-minute fitness plan that you will continue to use after this class is over. Keep in mind variety, motivation and your overall goal!…

    • 539 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    Project

    • 799 Words
    • 4 Pages

    The exquisiteness of the material and the sophistication of the carving indicate that it was created by the exclusive guild of royal ivory carvers for the king. This exquisite piece is made out of ivory, iron and cooper. This piece also contains pieces of inlaid metal and elaborate coral carvings. The piece dimensions are as followed; H. 9 3/8 x W. 5 x D. 3 1/4 in. (23.8 x 12.7 x 8.3 cm). The mask is a sensitive human idealized portrait, depicting its subject with softly modeled features. This piece is framed with an elegant tiara-like coiffure and openwork collar. The pupils were inlaid with iron metal, the forehead has carved scarification marks and also she is wearing bands of coral beads below the chin. In the necklace you can see miniature motifs that represent heads of the Portuguese soldiers depicted with beards and flowing hair. In the crown tiara-like coiffure are carved more Portuguese heads alternated with figures of stylized mudfish, which symbolizes Olokun, the Lord of the Great Waters. You can see that some of the necklace portion is damage or missing and this could be due to the age and fragility of the coral.…

    • 799 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2010). Management of information security (3rd ed.). Boston, MA: Course Technology/Cengage Learning.…

    • 1167 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    You are an information security analyst working for UNFO. UNFO expects to have over 6,000,000 transactions and online revenue in excess of $50,000,000 in sales for its sporting equipment and apparel during the course of the year. Additionally, it has been learned that customers will be able to call in by using credit card numbers to make an online purchase. The conversations will be recorded and stored in the organization's Private Branch Exchange (PBX) system. Your manager asks you to outline a Web security life cycle for the organization. This outline will later be compiled as part of the organization's overall security policy by the organization's Senior Security Engineer.…

    • 324 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Project

    • 2624 Words
    • 11 Pages

    Back to TopYou are a senior Project Manager for the XYZ Computers Company. XYZ Computers is a computer company, which build personal and business computer solutions.…

    • 2624 Words
    • 11 Pages
    Good Essays
  • Powerful Essays

    An initial task in a security assessment will focus on the basic hardware, software, and network of the system, also known as the infrastructure. Identifying types of hardware and software will dictate a large part of the requirements necessary to protect the environment. Also, a thorough analysis of the hardware will help in identifying what exists where. This information can be used for planning for replacement (Chapter, 2003).…

    • 1453 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Risk Assessment Lab 1

    • 741 Words
    • 5 Pages

    2. How many threats and vulnerabilities did you find that impacted risk in each of the seven…

    • 741 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Risk Management Lab 1

    • 562 Words
    • 4 Pages

    2. How many threats and vulnerabilities did you find that impacted risk within each of the seven domains of a typical IT infrastructure?…

    • 562 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    project

    • 3763 Words
    • 20 Pages

    Our low deltas on a CSAM help to define our ________________ strategies. Selected Answer: a.…

    • 3763 Words
    • 20 Pages
    Satisfactory Essays
  • Good Essays

    For your application to this program you are asked to prepare a high-level summary of an information security program. Your summary should demonstrate that you are able to read, understand, apply, and write about common information security concepts at the apprentice level. Your summary must include an analysis that addresses strategic fit (how well the information security program supports the organization’s goals and objectives), breadth and coverage of the information security program (people, processes, technologies), any known or previously uncovered program deficiencies or implementation issues, and any stated costs and benefits of the program.…

    • 1643 Words
    • 7 Pages
    Good Essays