Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Purpose

This course project is intended to assess your ability to comprehend and apply the basic concepts related to information security management, such as the following:

The ability to discern when a risk assessment should be performed and carrying out the task.

Understanding user or customer access requirements, whether remote or local.

Using a layered security approach to establish and maintain access controls.

Working with other departments, such as the human resources department, to identify and implement methods to prevent unwarranted exposure to information by inappropriate personnel.

Your ability to execute the tasks within these information security domains and others will be evaluated against the learning objectives as identified and described in previous lessons of instruction for this course.

Introduction to the Project

User identification, authentication, and authorization are essential in developing, implementing, and maintaining a framework for information system security. The basic function of an information system security framework is to ensure the confidentiality and the integrity, as well as the availability of systems, applications, and data. Certain information security implementation and management knowledge is required of network administrators, IT service personnel, management, and IT security practitioners, such as information security officers, security analysts, and domain administrators.

Project Scenario

You are presented a complete scenario that is contained in the document, Scenario.pdf. You must read and understand this document to complete this project. You play the dual role of an IT architect and IT security specialist working for Integrated Distributors Incorporated (IDI), a multi-national organization with offices in several countries. Your instructor for this course plays the role of the chief information officer (CIO). Your peers play the role of selected technology staff. Each of the organization's locations is operating with different information technologies and infrastructure - IT systems, applications, and databases. Various levels of IT security and access management have been implemented and embedded within their respective locations.

Goals of the Project (Tasks)

Your goals as the IT architect and IT security specialist are to:

Develop solutions to the issues that the specified location of IDI is facing.

Develop plans to implement corporate-wide information access methods to ensure confidentiality, integrity, and availability.

Assess risks and vulnerabilities with operating IT facilities in the disparate locations where IDI now functions and develop mitigation plans and implementation methods.

Analyze the strengths and weaknesses in the current systems of IDI.

Address remote user and Web site user's secure access requirements.

Develop a proposed budget for theproject - considerhardware, software, upgrades/replacements, and consulting services.

Prepare detailed network and configuration diagrams outlining the proposed change to be able to present it to the management.

Develop and submit a comprehensive 8-page report (Word document) addressing the learning objectives and your solutions to the issues within the scenario.

Prepare a 10 -15 slidePowerPointpresentation that addresses important access control, infrastructure, and management aspects from each location.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92533122
  • Price:- $10

Priced at Now at $10, Verified Solution

Have any Question?


Related Questions in Computer Engineering

What is the solution for chapter 15 3e for java programming

What is the solution for chapter 15 3e for java programming 8th edition Create a JFrame that holds fjive buttons with the names of five different fonts. Include a sexth button that the user can click to make a font large ...

Question summary of what is legal and regulatory

Question : Summary of what is legal and regulatory obligations regarding data and information security. Summary of project initiation in the technology world.

Question a show the results of inserting 10 12 1 14 6 5 8

Question : a) Show the results of inserting 10, 12, 1, 14, 6, 5, 8, 15, 3, 9, 7, 4, 11, 13, and 2, one at a into an initially empty binary heap. Show the tree at each stage. b) Show the result of performing three DeleteM ...

A specialty software development firm is planning to offer

A specialty software development firm is planning to offer one of four new software products and wishes to maximize profit, minimize risk, and increase market share. If a weight of 65% is assigned to profit potential, 20 ...

Systems analysis and design projectpersonal trainer inc

Systems Analysis and design project Personal Trainer, Inc. owns and operates fitness centers in a dozen Midwestern cities. The centers have done well, and the company is planning an international expansion by opening a n ...

Discuss why a financial services organization would benefit

Discuss why a financial services organization would benefit from using one framework over another (COSO, COBIT,) -- choose a framework or frameworks that in your opinion would be most ideally suited for such an organizat ...

Arectangular box without a top has surface area 2500 cm2

A rectangular box without a top has surface area 2500 cm2 . The length x of its base is 18 cm longer that its width. (a) Use MATLAB's polynomial functions to express the volume V of the box in terms of x. (b) Plot V vs x ...

Statistics and facts about smartphonessmartphones mobile

Statistics and facts about Smartphones Smartphones, mobile phones with more advanced computing capabilities and connectivity than regular mobile phones, came onto the consumer market in the late 90s, but only gained main ...

The second programming project involves writing a program

The second programming project involves writing a program that accepts an arithmetic expression of unsigned integers in postfix notation and builds the arithmetic expression tree that represents that expression. From tha ...

Quesiton for completion of the program use arrays and

Quesiton: For completion of the program, use arrays and files. Instead of prompting the user for the prices of the book, update the website program to reflect the following changes: • Read the prices into an array from a ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As