SophiaPretty

(5)

$14/per page/Negotiable

About SophiaPretty

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Accounting,Algebra See all
Accounting,Algebra,Applied Sciences,Architecture and Design,Art & Design,Biology,Business & Finance,Calculus,Chemistry,Communications,Computer Science,Economics,Engineering,English,Environmental science,Essay writing Hide all
Teaching Since: Jul 2017
Last Sign in: 304 Weeks Ago, 1 Day Ago
Questions Answered: 15833
Tutorials Posted: 15827

Education

  • MBA,PHD, Juris Doctor
    Strayer,Devery,Harvard University
    Mar-1995 - Mar-2002

Experience

  • Manager Planning
    WalMart
    Mar-2001 - Feb-2009

Category > Computer Science Posted 09 Nov 2017 My Price 10.00

what risk could be taken if less security measures were in place.

Attached is the document, I already wrote, but it is picked up for fraud. Please change the words around, because this will be submitted to turn it in. I would like these sections to make sense, you

 

Business Needs

            WWTC goals must be addressed to find a balance between security and business needs. This will be used to balance what risk could be taken if less security measures were in place. The company needs to identify which expenses can be covered on their budget while also calculating the return on investment. This would be a balance between obtaining state of the art computer security equipment that is very expensive, or buying less expensive equipment that is not as secure. . The network needs to be available every day and it must be able to handle the workload of day to day operations. Another need the company must have is ensuring their data is safe. For instance, if an employee sends an email or any other type of data to another employee, the network should ensure the integrity of the data by preventing it from being tampered with. WWTC must conduct business analyses, return on investment (ROI), and the triad of confidentiality, integrity, and availability (CIA) to continue business operations with minimal disruption. 

            Business analyses will be needed to calculate what the expenses of security devices and configuration are going to be, along with whether the cost would be worth additional security or not. The return on investment will be calculated by using the following formula: ROI = (Gain from investment - cost of investment) / Cost of investment. This will cover all the expenses that will be used for network devices along with the configuration and maintenance of the network. WWTC will ensure confidentiality by providing access only to authorized personnel on a need to know basis. The controls that will be configured are the use of encryption, authentication, and access controls. Integrity will be provided through the use of authentication, non-repudiation, and accountability. The organization will have audit logs in case of security breaches, which will not only save time but revenue as well. High availability will be provided by having WWTC networks adopt the Cisco modular approach by having networks separated into modules, which will ease the congestion in the network and provide fault tolerance. Availability will also be needed to prevent degradation of business operations, resulting in a loss of revenue.

Security Diagram

The network architecture for WWTC is taking the defense in depth strategy when it comes to security, which was previously mentioned in the Security Design section above. The following is the security diagram for WWTC’s New York office:

 

may also change the design of the images too. Thanks in advance!

Attachments:

Answers

(5)
Status NEW Posted 09 Nov 2017 01:11 PM My Price 10.00

----------- He-----------llo----------- Si-----------r/M-----------ada-----------m -----------Tha-----------nk -----------you----------- fo-----------r y-----------our----------- in-----------ter-----------est----------- an-----------d b-----------uyi-----------ng -----------my -----------pos-----------ted----------- so-----------lut-----------ion-----------. P-----------lea-----------se -----------pin-----------g m-----------e o-----------n c-----------hat----------- I -----------am -----------onl-----------ine----------- or----------- in-----------box----------- me----------- a -----------mes-----------sag-----------e I----------- wi-----------ll -----------be -----------qui-----------ckl-----------y

Not Rated(0)