Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

1. Risk Assessment of ICT System

Perform risk assessment for the organization and it is related to ICT security threats and vulnerabilities. The final outcome is to identify :

a. critical ICT assets and their vulnerabilities;

b. to recommend measures to ensure that those ICT assets are in forensic readiness when the computer security incidents occur.

Idea is to ensure also preservation of digital evidences where it is practicable.

I need one specific example of that ICT Risk Assessment process (e.g. what are identified critical assets, how they are classified according to its threats ,impact and vulnerabilities) and what are the measures for forencis readiines after threats/vulnerabilities are identified, which will expand ideas to finalize my document-see above under a., and then recommend measures for forensic readiness-see above under b.).

2. Developing Computer Incident Response System on WAMP platform

I need help with initial programming of the system as displayed in the attachment..its about simple computer incident response system that , as per my idea, shall be universal and easily deployed elsewhere on Windows platforms. In this attempt, I would like to build it on WAMP with Apache as Webserver, My SQL as database server and PHP scripting language which I already have on my system but this is not highly constrained.

Any initial (or if you have pre-build) working system as described in attached algorithm will help me to continue tailoring/re-modifying it to my needs and I will enrich it with more scripts that will generate reports (as emails) when various security breaches occur on ICT network.

 

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9131381
  • Price:- $45

Priced at Now at $45, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Salesthe sales department is in a unique position customers

Sales The sales department is in a unique position: customers seek out Thermo-Chem because it has cornered the market with virtually no competition except in the chemicals market. Therefore, only limited sales effort is ...

Question suppose that a store offers gift certificates in

Question : Suppose that a store offers gift certificates in denominations of 25 dollars and 40 dollars. Determine the possible total amounts you can form using these gift certificates. Prove your answer using strong indu ...

Question what sequence of numbers would be printed by the

Question : What sequence of numbers would be printed by the following recursive function if we started it with N assigned the value 1? def Exercise (N): print(N) if (N Exercise(N + 1) print(N)

Research the fire at the federal aviation administration

Research the fire at the Federal Aviation Administration (FAA) facility in Chicago, Illinois (2014). Provide insight into the following: What went wrong? What went right? Would a risk assessment strategy if employed miti ...

A single precision ieee 754 number is stored in memory at

A single precision IEEE 754 number is stored in memory at address X. Write a sequence of ARM instructions to multiply the number at X by 16 and store the result back at X. You must accomplish this without using any float ...

Why are some nations economically strong and others

Why are some nations economically strong and others economically weak?

Wat are three 3 major categories of cyber terrorism and

What are three (3) major categories of cyber terrorism and / or information warfare. Among the chosen categories, determine the one (1) that should be the top priority for the federal government to address.

Please help with anbspfunctionnbspcodesymbol to convert

Please help with a function  codeSymbol , to convert each mark to a symbol (A, B, C, D, E, F) and a code (7,6,5,4,3,2,1) according to the table below. And call it in the main function. Use the table below to determine th ...

Question after 1 year of launch ride sharing increased a

Question: After 1 year of launch, ride sharing increased a lot resulting in a lot of insertion requests to the database. Consider there is no room to further increase the size of server and changing database is not an op ...

The local police department must write an average of 5

The local police department must write an average of 5 traffic tickets each day to keep department revenues at budgeted levels. Suppose the number of tickets written per day follows a Poisson distribution with a mean of ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As