SmartExpert

(118)

$30/per page/Negotiable

About SmartExpert

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Accounting,Business & Finance See all
Accounting,Business & Finance,Economics,English,HR Management,Math Hide all
Teaching Since: Apr 2017
Last Sign in: 56 Weeks Ago, 4 Days Ago
Questions Answered: 7570
Tutorials Posted: 7352

Education

  • BS,MBA, PHD
    Adelphi University/Devry
    Apr-2000 - Mar-2005

Experience

  • HOD ,Professor
    Adelphi University
    Sep-2007 - Apr-2017

Category > Information Systems Posted 30 Apr 2017 My Price 17.00

CMIT 425 Advanced Information Systems Security Risk Assessment Paper

 From the devices and systems identified in the GFI Corporate Network Topology, conduct a thorough asset inventory, assign monetary values to each asset (quantitative), and assign a priority value for each asset (qualitative) that could be used to determine which assets are most critical for restoral in the event of a catastrophic event or attack.

 

• Evaluate the perimeter security, make a list of access points internal and external (remote), identify vulnerabilities and make suggestions for improvements to perimeter and network security.

 

• Evaluate the remote access infrastructure, identify vulnerabilities and suggest security improvements to mitigate risks to remote access.

 

• Address the COO’s concern over the mobility security and design a secure mobile computing (smart phones, tablets, laptops, etc.) in terms of authentication technologies and data protection.

 

• Identify wireless vulnerabilities and recommend what safeguards, authentication technologies,and network security to protect data should be implemented.

 

• Evaluate the authentication protocols and methodologies within the wired, wireless, mobility and remote access environments and suggest improvements to secure authentication forGFI.

 

• Evaluate the web system protocols and vulnerabilities within the Intranet server and suggest secure protocol improvements to improve security for web authentication.

 

• Design a cloud computing environment for the company with a secure means of data protection at rest, in motion and in process.

 

• Assess all known vulnerabilities on each asset in this environment and impacts if compromised.

 

• Using the asset inventory and the assigned values (monetary and priority) conduct a quantitative and qualitative risk assessment of the GFI network.

 

• Recommend risk mitigation procedures commensurate with the asset values from your asset inventory. Feel free to redesign the corporate infrastructure and use any combination of technologies to harden the authentication processes and network securitymeasures.

 

• Provide an Executive Summary.

 

• You are welcome to make assumptions for any unknown facts as long as you support your assumptions.

 

• The Title Page, Table of Contents and References page(s) don’t count in your 15 page minimum!!!

Answers

(118)
Status NEW Posted 30 Apr 2017 05:04 PM My Price 17.00

CMI-----------T 4-----------25 -----------Adv-----------anc-----------ed -----------Inf-----------orm-----------ati-----------on -----------Sys-----------tem-----------s S-----------ecu-----------rit-----------y R-----------isk----------- As-----------ses-----------sme-----------nt -----------Pap-----------er-----------

Attachments

file 1493574217-CMIT 425 Advanced Information Systems Security Risk Assessment Paper.docx preview (3726 words )
----------- -----------Glo-----------bal----------- Fi-----------nan-----------ce -----------Ind-----------ust-----------ry -----------Sec-----------uri-----------ty -----------Ris-----------k A-----------sse-----------ssm-----------ent----------- U-----------niv-----------ers-----------ity----------- of----------- Ma-----------ryl-----------and----------- Un-----------ive-----------rsi-----------ty -----------Col-----------leg-----------e -----------CMI-----------T 4-----------25 ----------- Da-----------te ----------- TA-----------BLE----------- OF----------- CO-----------NTE-----------NTS----------- -----------TOC----------- \o----------- &q-----------uot-----------;1------------3&q-----------uot-----------; \-----------h \-----------z \-----------u 1-----------. B-----------ack-----------gro-----------und----------- PA-----------GER-----------EF -----------_To-----------c43-----------759-----------670-----------1 \-----------h 3-----------1.1-----------Pur-----------pos-----------e P-----------AGE-----------REF----------- _T-----------oc4-----------375-----------967-----------02 -----------\h -----------41.-----------2 R-----------ole-----------s a-----------nd -----------Res-----------pon-----------sib-----------ili-----------tie-----------s P-----------AGE-----------REF----------- _T-----------oc4-----------375-----------967-----------03 -----------\h -----------42.----------- Se-----------cur-----------ity----------- Ri-----------sk -----------Ass-----------ess-----------men-----------t P-----------AGE-----------REF----------- _T-----------oc4-----------375-----------967-----------04 -----------\h -----------52.-----------1 R-----------isk----------- Im-----------pac-----------t P-----------AGE-----------REF----------- _T-----------oc4-----------375-----------967-----------05 -----------\h -----------63.----------- N-----------etw-----------ork----------- Of-----------fic-----------e T-----------opo-----------log-----------y P-----------AGE-----------REF-----------
Not Rated(0)