2023 SE571 Course Project Security Assessment and Recommendations Overview This course does involve a lot | Assignment Collections

Computer Science 2023 Computer Network Security

2023 SE571 Course Project Security Assessment and Recommendations Overview This course does involve a lot | Assignment Collections

SE571 Course Project: 
Security Assessment and Recommendations

Overview                                                                        

This course does involve a lot of technical information and theory but, what really matters is how this knowledge can be used to identify and remediate real-world security issues. What you learn in this course should be directly applicable to your work environment. The course project that you will complete is designed to further this goal. In the first part of the project you will choose an organization from one of two given scenarios (below), identify potential security weaknesses, and in the second part of the project, you will recommend solutions. The first part of the project isdue in week 3,and thesecond part of the project, along with the first part (presumably revised based on instructor feedback) isdue in week 7. This project constitutes a significant portion of your overall grade. This is an individual assignment and may not be completed in teams.              

Phase I

In this phase you will choose either Aircraft Solutions or Quality Web  Design as the company you will work with. You will then identify potential security weaknesses.

Security weaknesses – You must choose two from the following three areas:

·       hardware

·       software

·       policy (excluding password policies)

and identify an item that requires improved security. To clarify: you must identify

a) one hardware and one software weakness or,
b) one hardware and one policy weakness or,
c) one software and one policy weakness.

You must define the asset or policy with sufficient detail to justify your assessment. Your assessment must include:

·        the vulnerability associated with the asset or policy

·        the possible threats against the asset or policy

·        the likelihood that the threat will occur (risk)

·        the consequences to mission critical business processes should the threat occur

·        how the organization’s competitive edge will be affected should the threat occur


 

Other Required Elements:

·       Cover sheet

·       APA-style In-text citations and Reference section

·       Minimum length 3 pages, maximum length 5 pages (not counting cover sheet, diagram(s), references). Do not exceed the maximum length.

Phase II

In this phase of the project you will include Phase I (presumably improved as needed based upon week 3 feedback) and then you will recommend solutions for the security weaknesses you identified in the phase I.

Definition of the solution – Hardware solutions must include vendor, major specifications with an emphasis on the security features, location of placement with diagram. Software solutions must include vendor, major specifications with an emphasis on security features. Policy solutions must include the complete portion of the policy that addresses the weakness identified. Any outsourced solution must include the above details and the critical elements of the service level agreement.

Justification – You must address the efficacy of the solution in terms of the identified threats and vulnerabilities, the cost of the solution including its purchase (if applicable) and its implementation including training and maintenance.

Impact on business processes – You must discuss any potential positive or negative effects of the solution on business processes and discuss the need for a trade-off between security and business requirements using quantitative rather than simply qualitative statements.

Other Required Elements:

·       Cover sheet

·       APA-style

·       In-text citations and Reference section

·        5 reference minimum.

·       Minimum length of solutions: 6 pages, maximum length 10 pages (not counting cover sheet, diagram(s), references). Do not exceed the maximum length

Grading Standards

The course project will consist of two deliverables: The Phase I  and the Course Project (comprised of Phase I and II). The grading standards for each deliverable follow.

Phase I:Grading Standards – Total 100 points

Security Weaknesses – Identifies two plausible and significant weaknesses from required list (hardware, software, policy). Includes realistic vulnerability(s) associated with the asset or policy, plausible and likely threats against the asset or policy, an estimation of the likelihood that the threat will occur (risk), the consequences to mission critical business processes should the threat occur, and how the organization’s competitive edge will be affected should the threat occur. 80 points

Presentation – Writing quality and flow demonstrates a graduate-level writing competency and does not contain misspellings, poor grammar, incorrect punctuation, and questionable sentence structure (syntax errors). 20 points

 

Course Project: (Phases I and II) Grading Standards – Total 170 points

Security Weaknesses – Identifies two plausible and significant weaknesses from required list (hardware, software, policy). Includes realistic vulnerability(s) associated with the asset or policy, plausible and likely threats against the asset or policy, an estimation of likelihood that the threat will occur (risk), the consequences to mission critical business processes should the threat occur, and how the organization’s competitive edge will be affected should the threat occur. 60 points

Definition of Solution – Includes vendor, major specifications and identifies the relevant security features as related to the weakness identified. If hardware, includes location of placement with diagram. Policy solutions include the complete portion of the policy that effectively address the weakness identified. Any outsourced solution must include the above details and the critical elements of the service level agreement.30 points

Justification – Demonstrates the efficacy of the solution in terms of the identified threats and vulnerabilities. Includes complete costs including purchase, implementation, training and maintenance as needed. 30 points

Impact on Business Processes – Addresses plausible, potential positive or negative effects on business processes. Discusses trade-off between security and business requirements using quantitative statements. 25 points

Presentation – Writing quality and flow demonstrates a graduate-level writing competency and does not contain misspellings, poor grammar, incorrect punctuation, and questionable sentence structure (syntax errors). 25 points

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

#write essay #research paper #blog writing #article writing #academic writer #reflective paper #essay pro #types of essays #write my essay #reflective essay #paper writer #essay writing service #essay writer free #essay helper #write my paper #assignment writer #write my essay for me #write an essay for me #uk essay #thesis writer #dissertation writing services #writing a research paper #academic essay #dissertation help #easy essay #do my essay #paper writing service #buy essay #essay writing help #essay service #dissertation writing #online essay writer #write my paper for me #types of essay writing #essay writing website #write my essay for free #reflective report #type my essay #thesis writing services #write paper for me #research paper writing service #essay paper #professional essay writers #write my essay online #essay help online #write my research paper #dissertation writing help #websites that write papers for you for free #write my essay for me cheap #pay someone to write my paper #pay someone to write my research paper #Essaywriting #Academicwriting #Assignmenthelp #Nursingassignment #Nursinghomework #Psychologyassignment #Physicsassignment #Philosophyassignment #Religionassignment #History #Writing #writingtips #Students #universityassignment #onlinewriting #savvyessaywriters #onlineprowriters #assignmentcollection #excelsiorwriters #writinghub #study #exclusivewritings #myassignmentgeek #expertwriters #art #transcription #grammer #college #highschool #StudentsHelpingStudents #studentshirt #StudentShoe #StudentShoes #studentshoponline #studentshopping #studentshouse #StudentShoutout #studentshowcase2017 #StudentsHub #studentsieuczy #StudentsIn #studentsinberlin #studentsinbusiness #StudentsInDubai #studentsininternational