SE571 Principles of Information Security and Privacy Security Assessment and Recommendations (Phase II)

Phase II of a security assessment project.

Olivia Smith
Contributor
4.0
58
about 1 month ago
Preview (4 of 10)
Sign in to access the full document!
Security Assessment and Recommendations
(Phase II)

Ravindra Patel

Submitted to: Professor John Michalek

SE571 Principles of Information Security and Privacy

Keller Graduate School of Management

Submitted: February 21, 2014

For your course project, you are tasked with identifying and addressing two significant security
vulnerabilities in a company’s network and security policies. Choose a company, such as
Aircraft Solutions, and analyze its current hardware and policy weaknesses. You will assess the
risks and consequences associated with each vulnerability and propose detailed solutions,
including the implementation of necessary hardware (e.g., firewalls) and policy changes (e.g.,
updated security review frequency). Discuss the impact these solutions will have on the
company's business processes and provide a cost analysis of implementing the recommendations.
Be sure to include a budget breakdown for the hardware solution and the ongoing costs related to
policy updates. Finally, conclude with a summary of your findings and justifications for the
recommended actions. (Word count requirement: 2,5003,000 words)
Security Assessment and Recommendations (Phase II)
2

Table of Contents

Executive Summary………………………………………………………….. 3
Company Overview…………………………………………………………... 3
Two Security Vulnerabilities………………………………………………… 4
o
Hardware Vulnerability.......................................................................... 4
o
Policy Weakness……………………………………………………..… 5
Recommended Solutions………………………………………………..……. 6
o
Hardware Solution…………………………………………………..… 6
o
Policy Solution........................................................................................ 8
o
Impact on Business Processes………………………………………..... 8
Budget……………………………………………………………………..…... 9
Summary……………………………………………………………………… 9
References…………………………………………………………………….. 10
Preview Mode

Sign in to access the full document!

100%

Study Now!

XY-Copilot AI
Unlimited Access
Secure Payment
Instant Access
24/7 Support
Document Chat

Document Details

University
DeVry University
Subject
Information Technology

Related Documents

View all