The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Apr 2017 |
| Last Sign in: | 103 Weeks Ago, 3 Days Ago |
| Questions Answered: | 4870 |
| Tutorials Posted: | 4863 |
MBA IT, Mater in Science and Technology
Devry
Jul-1996 - Jul-2000
Professor
Devry University
Mar-2010 - Oct-2016
I.                   Title Page
II.                Abstract (150-250 words)
III.             Information System Infrastructure
a.      Organizational Structure and Business Units
b.     Mission Critical System
                                                             i.     System Description
1.     Hardware
2.     Software (Include the definition of OSI, TCP/IP and network protocols used)
                                                           ii.     CIA of PHI (describe how the system is protecting the CIA of PHI to include talking about how your current antivirus detects malware and how that contributes to CIA of PHI)
IV.             Vulnerabilities
a.      Identity Management
                                                             i.     Authentication
                                                           ii.     Authorization
                                                         iii.     Access Control
1.     Access Control Lists
2.     Role-based Access Controls
3.     Files Access Control
4.     Database Access Control
5.     Mobile Devices Access Control (such as laptops)
V.               Threats
a.      Insider Threat
b.     Intrusion Motives
c.      Hacker Psychology
VI.             Risks (lists current risks with severity levels)
VII.          Password Cracking Tools
a.      Benefits
b.     Risks
c.      Results (insert workspace screenshots)
VIII.       Comparative Analysis
a.      Cyberattacks
                                                             i.     Attack 1 (description)
                                                           ii.     Attack 2 (description)
b.     SpeedÂ