Free Essay

Course 571 Weaknesses Outline

In:

Submitted By regg122008
Words 914
Pages 4
SE571 Course Project:
Security Assessment and Recommendations
Overview
This course does involve a lot of technical information and theory but, what really matters is how this knowledge can be used to identify and remediate real-world security issues. What you learn in this course should be directly applicable to your work environment. The course project that you will complete is designed to further this goal. In the first part of the project you will choose an organization from one of two given scenarios (below), identify potential security weaknesses, and in the second part of the project, you will recommend solutions. The first part of the project is due in week 3, and the second part of the project, along with the first part (presumably revised based on instructor feedback) is due in week 7. This project constitutes a significant portion of your overall grade. This is an individual assignment and may not be completed in teams.
-------------------------------------------------
Phase I
In this phase you will choose either Aircraft Solutions or Quality Web Design as the company you will work with. You will then identify potential security weaknesses.
Security weaknesses – You must choose two from the following three areas: * hardware * software * policy (excluding password policies) and identify an item that requires improved security. To clarify: you must identify
a) one hardware and one software weakness or,
b) one hardware and one policy weakness or,
c) one software and one policy weakness.
You must define the asset or policy with sufficient detail to justify your assessment. Your assessment must include: * the vulnerability associated with the asset or policy * the possible threats against the asset or policy * the likelihood that the threat will occur (risk) * the consequences to mission critical business processes should the threat occur * how the organization’s competitive edge will be affected should the threat occur

Other Required Elements: * Cover sheet * APA-style In-text citations and Reference section * Minimum length 3 pages, maximum length 5 pages (not counting cover sheet, diagram(s), references). Do not exceed the maximum length.
-------------------------------------------------
Phase II
In this phase of the project you will include Phase I (presumably improved as needed based upon week 3 feedback) and then you will recommend solutions for the security weaknesses you identified in the phase I.
Definition of the solution - Hardware solutions must include vendor, major specifications with an emphasis on the security features, location of placement with diagram. Software solutions must include vendor, major specifications with an emphasis on security features. Policy solutions must include the complete portion of the policy that addresses the weakness identified. Any outsourced solution must include the above details and the critical elements of the service level agreement.
Justification – You must address the efficacy of the solution in terms of the identified threats and vulnerabilities, the cost of the solution including its purchase (if applicable) and its implementation including training and maintenance.
Impact on business processes - You must discuss any potential positive or negative effects of the solution on business processes and discuss the need for a trade-off between security and business requirements using quantitative rather than simply qualitative statements.
Other Required Elements: * Cover sheet * APA-style * In-text citations and Reference section * 5 reference minimum. * Minimum length of solutions: 6 pages, maximum length 10 pages (not counting cover sheet, diagram(s), references). Do not exceed the maximum length
-------------------------------------------------
Grading Standards
The course project will consist of two deliverables: The Phase I and the Course Project (comprised of Phase I and II). The grading standards for each deliverable follow.
Phase I: Grading Standards – Total 100 points
Security Weaknesses – Identifies two plausible and significant weaknesses from required list (hardware, software, policy). Includes realistic vulnerability(s) associated with the asset or policy, plausible and likely threats against the asset or policy, an estimation of the likelihood that the threat will occur (risk), the consequences to mission critical business processes should the threat occur, and how the organization’s competitive edge will be affected should the threat occur. 80 points
Presentation – Writing quality and flow demonstrates a graduate-level writing competency and does not contain misspellings, poor grammar, incorrect punctuation, and questionable sentence structure (syntax errors). 20 points

Course Project: (Phases I and II) Grading Standards – Total 170 points
Security Weaknesses – Identifies two plausible and significant weaknesses from required list (hardware, software, policy). Includes realistic vulnerability(s) associated with the asset or policy, plausible and likely threats against the asset or policy, an estimation of likelihood that the threat will occur (risk), the consequences to mission critical business processes should the threat occur, and how the organization’s competitive edge will be affected should the threat occur. 60 points
Definition of Solution – Includes vendor, major specifications and identifies the relevant security features as related to the weakness identified. If hardware, includes location of placement with diagram. Policy solutions include the complete portion of the policy that effectively address the weakness identified. Any outsourced solution must include the above details and the critical elements of the service level agreement.30 points
Justification – Demonstrates the efficacy of the solution in terms of the identified threats and vulnerabilities. Includes complete costs including purchase, implementation, training and maintenance as needed. 30 points
Impact on Business Processes – Addresses plausible, potential positive or negative effects on business processes. Discusses trade-off between security and business requirements using quantitative statements. 25 points
Presentation – Writing quality and flow demonstrates a graduate-level writing competency and does not contain misspellings, poor grammar, incorrect punctuation, and questionable sentence structure (syntax errors). 25 points

Similar Documents

Premium Essay

Aircraft Solutions

...Running head: AIRCRAFT SOLUTIONS AIRCRAFT SOLUTIONS Keller Graduate School of Management SEC 571 Principles of Information Security and Privacy Abstract An assessment of Aircraft Solutions (AS) as to what Security Vulnerabilities that might be found, two areas discussed are Hardware & Policy weakness and impact. Table of Contents Executive Summary 1 Company Overview 1 Security Vulnerabilities 2 Hardware Vulnerability …………………………………………………..…….....2 Policy Vulnerability……………………………………………………………….3 Recommended Solutions 5 Hardware Vulnerability 5 Policy Vulnerability 8 Impact on Business Processes 9 Summary 11 References 12 Executive Summary The purpose of this paper is to explore and assess computer security as it relates to Aircraft Solutions. When we talk about computer security, we mean that we are addressing one or all of the three important aspects of any computer-related system: confidentiality, integrity, and availability. One of the challenges in building a secure system is finding the right balance among the goals, which often conflict. Aircraft Solutions provides full spectrum design and implementation solutions to multiple industries including the electronics, aerospace, commercial, and defense industries. In addition to the background information presented in the course assignment, additional information on geographic layout, business process, and IT architecture were presented. With the information provided, and based on...

Words: 1902 - Pages: 8

Premium Essay

Law and Speaking

...Stepping Up to the Podium with Confidence: A Primer for Law Students on Preparing and Delivering an Appellate Oral Argument James D. Dimitri1 Virtually all law students are required to learn oral advocacy skills at some point during their legal education. Typically, these skills are cultivated through at least one oral argument assignment, which often consists of an appellate oral argument that is given as part of the students’ first-year legal research and writing course or as part of a moot court competition. While appellate courts do not grant oral argument as often as they used to,2 oral advocacy remains a critical skill for law students to learn and cultivate, no matter which facet of law practice they enter upon graduation.3 Unfortunately, the prospect of learning this critical skill through an oral argument assignment can be disquieting to students. The main reason for this unease is simple: most law students have little to no oral advocacy experience. Students may, however, ease their anxiety and ultimately deliver an excellent oral argument if they fully understand the purposes of the argument and if they thoroughly prepare for the argument. This article is targeted at oral argument novices. It discusses how you, as a beginner to appellate oral argument, may effectively prepare and deliver an argument, particularly if you are Clinical Associate Professor of Law, Indiana University School of Law – Indianapolis; J.D., Summa cum laude, 1993, Valparaiso University School...

Words: 10851 - Pages: 44

Premium Essay

Real-Time Fraud Detection: How Stream Computing Can Help the Retail Banking Industry

...Para os meus pais, porque "o valor das coisas não está no tempo que elas duram, mas na intensidade com que acontecem. Por isso existem momentos inesquecíveis, coisas inexplicáveis e pessoas incomparáveis" como vocês! Obrigado por tudo, Filipe Abstract The Retail Banking Industry has been severely affected by fraud over the past few years. Indeed, despite all the research and systems available, fraudsters have been able to outsmart and deceive the banks and their customers. With this in mind, we intend to introduce a novel and multi-purpose technology known as Stream Computing, as the basis for a Fraud Detection solution. Indeed, we believe that this architecture will stimulate research, and more importantly organizations, to invest in Analytics and Statistical Fraud-Scoring to be used in conjunction with the already in-place preventive techniques. Therefore, in this research we explore different strategies to build a Streambased Fraud Detection solution, using advanced Data Mining Algorithms and Statistical Analysis, and show how they lead to increased accuracy in the detection of fraud by at least 78% in our reference dataset. We also discuss how a combination of these strategies can be embedded in a Stream-based application to detect fraud in real-time. From this perspective, our experiments lead to an average processing time of 111,702ms per transaction, while strategies to further improve the performance are discussed. Keywords: Fraud Detection, Stream Computing, Real-Time...

Words: 56858 - Pages: 228

Premium Essay

Real-Time Fraud Detection

...Para os meus pais, porque "o valor das coisas não está no tempo que elas duram, mas na intensidade com que acontecem. Por isso existem momentos inesquecíveis, coisas inexplicáveis e pessoas incomparáveis" como vocês! Obrigado por tudo, Filipe Abstract The Retail Banking Industry has been severely affected by fraud over the past few years. Indeed, despite all the research and systems available, fraudsters have been able to outsmart and deceive the banks and their customers. With this in mind, we intend to introduce a novel and multi-purpose technology known as Stream Computing, as the basis for a Fraud Detection solution. Indeed, we believe that this architecture will stimulate research, and more importantly organizations, to invest in Analytics and Statistical Fraud-Scoring to be used in conjunction with the already in-place preventive techniques. Therefore, in this research we explore different strategies to build a Streambased Fraud Detection solution, using advanced Data Mining Algorithms and Statistical Analysis, and show how they lead to increased accuracy in the detection of fraud by at least 78% in our reference dataset. We also discuss how a combination of these strategies can be embedded in a Stream-based application to detect fraud in real-time. From this perspective, our experiments lead to an average processing time of 111,702ms per transaction, while strategies to further improve the performance are discussed. Keywords: Fraud Detection, Stream Computing, Real-Time...

Words: 56858 - Pages: 228

Premium Essay

International Finance

...International Finance: A Course Overview Mihir A. Desai* Harvard University and NBER ABSTRACT This paper describes the International Finance course at Harvard Business School for instructors considering adopting the associated material. The paper begins by arguing that the forces of globalization have fundamentally changed the scope and activities of firms thereby altering the practice of finance within these firms. As a consequence of an increasing reliance on tightly-integrated foreign operations, a parallel world of finance has been opened within every multinational firm and this world has, heretofore, been overlooked. The course materials are designed to address the many aspects of financial decision making within global firms prompted by these changes that are not addressed in traditional materials. The paper provides an overview of the structure of the course and its seven modules with particular emphasis on the three modules that constitute the core of the course. The paper also describes an analytical framework that has been developed through the creation of the course materials to guide critical financial decisions on financing, investment, risk management and incentive management within a multinational firm. This framework emphasizes the need to reconcile conflicting forces in order for multinational firms to gain competitive advantage from their internal capital markets. The paper concludes with a discussion of the course's pedagogical approach and detailed descriptions...

Words: 25419 - Pages: 102

Premium Essay

Missionary Roots of Liberal Democracy by Robert D. Woodberry

...American Political Science Review Vol. 106, No. 2 May 2012 doi:10.1017/S0003055412000093 The Missionary Roots of Liberal Democracy ROBERT D. WOODBERRY National University of Singapore T his article demonstrates historically and statistically that conversionary Protestants (CPs) heavily influenced the rise and spread of stable democracy around the world. It argues that CPs were a crucial catalyst initiating the development and spread of religious liberty, mass education, mass printing, newspapers, voluntary organizations, and colonial reforms, thereby creating the conditions that made stable democracy more likely. Statistically, the historic prevalence of Protestant missionaries explains about half the variation in democracy in Africa, Asia, Latin America and Oceania and removes the impact of most variables that dominate current statistical research about democracy. The association between Protestant missions and democracy is consistent in different continents and subsamples, and it is robust to more than 50 controls and to instrumental variable analyses. ocial scientists tend to ignore religion in the processes of post-Enlightenment modernization. In individual cases and events, the role of religious actors is clear—especially in the primary documents. Yet in broad histories and comparative analyses, religious groups are pushed to the periphery, only to pop out like a jack-in-the-box from time to time to surprise and scare people and then shrink...

Words: 26573 - Pages: 107

Premium Essay

Writing for Success

...express yourself via the written word, this book is for you. Writing for Success is a text that provides instruction in steps, builds writing, reading, and critical thinking, and combines comprehensive grammar review with an introduction to paragraph writing and composition. Beginning with the sentence and its essential elements, this book addresses each concept with clear, concise, and effective examples that are immediately reinforced with exercises and opportunities to demonstrate learning. Each chapter allows students to demonstrate mastery of the principles of quality writing. With its incremental approach, this book can address a range of writing levels and abilities, helping each student prepare for the next writing or university course. Constant reinforcement is provided through examples and exercises, and the text involves students in the learning process through reading, problem solving, practicing, listening, and experiencing the writing process. Each chapter also has integrated examples that unify the discussion and form a common, easy-tounderstand basis for discussion and exploration. This will put students at ease and allow for greater absorption of the material. Tips for effective writing are included in every chapter, as well. Thought-provoking scenarios provide challenges and opportunities for collaboration and interaction. These exercises are especially helpful for working with groups of students. Clear exercises teach sentence and paragraph writing skills that...

Words: 171477 - Pages: 686

Premium Essay

Case Studies

...30 GOOD PRACTICE CASE STUDIES IN UNIVERSITY-BUSINESS COOPERATION PART OF THE DG EDUCATION AND CULTURE STUDY ON THE COOPERATION BETWEEN HIGHER EDUCATION INSTITUTIONS AND PUBLIC AND PRIVATE ORGANISATIONS IN EUROPE EUROPEAN COMMISSION Directorate-General for Education and Culture Directorate C: Lifelong learning: higher education and international affairs European Institute of Innovation and Technology; economic partnership Public open tender EAC/37/2009: CONTENTS CONTENTS INTRODUCTION Scope of report Introduction to UBC Elements in the UBC Ecosystem 5 5 5 5 AIMS & METHODOLOGY Introduction Objective Process for selection Basis for selection Countries considered in the selection of the cases Case study partners 7 7 7 7 8 8 9 CASE STUDIES Case study key insights Classification of countries Nature of case study Case study quick-find 10 10 12 12 13 NORTHERN Europe Case 1: SEA, Denmark Case 2: ETM, Estonia Case 3: Demola, Finland Case 4: REAP, Ireland Case 5: Mobility at UL, Latvia Case 6: CSE, Sweden Case 7: SMIL, Sweden Case 8: SPEED, UK Case 9: IDI/Digital City, UK Case 10: Acua Limited, UK 18 19 25 30 35 41 46 52 57 63 70 76 80 84 90 96 EASTERN EUROPE Case 11: GIS, Bulgaria Case 12: TTO Pécs, Hungary Case 13: The Science and Economy Project, Poland Case 14: WCTT, Poland Case 15: Q-PlanNet, Romania 75 1 © Science-to-Business Marketing Research Centre CONTENTS SOUTHERN EUROPE Case 16: MUHC, Malta Case 17: PNICube...

Words: 60370 - Pages: 242

Premium Essay

Scavenger Hunt Questions and Answers

...educational mission of the University, the information, policies, procedures, regulations and requirements contained herein are continually being reviewed, changed and updated. Consequently, this document cannot be considered binding. Students are responsible for keeping informed of official policies and meeting all relevant requirements. When required changes to the Catalog occur, they will be communicated through catalog inserts and other means until a revised edition of the Catalog is published. The policies in this Catalog have been approved under the authority of the ECPI University Board of Trustees and, therefore, constitute official University policy. Students should become familiar with the policies in this Catalog. These policies outline both student rights and student responsibilities. The University reserves the right and authority at any time to alter any or all of the statements contained herein, to modify the requirements for admission and graduation, to change or discontinue programs of study, to amend any regulation or policy affecting the student body, to increase tuition and fees, to deny admission, to revoke an offer of admission and to dismiss from the University any student at any time, if it is deemed by the University to be in the best interest of the University, the University community, or the student to do so. The provisions of this publication are subject to change without notice and nothing in this publication may be considered as setting forth terms of...

Words: 130938 - Pages: 524

Free Essay

Communication in Our Lives

...Licensed to: iChapters User Licensed to: iChapters User 6e FIFTH EDITION COMMUNICATION in Our Lives LINEBERGER DISTINGUISHED PROFESSOR OF HUMANITIES CAROLINE H. AND THOMAS S. ROYSTER DISTINGUISHED PROFESSOR OF GRADUATE EDUCATION THE UNIVERSITY OF NORTH CAROLINA AT CHAPEL HILL Australia . Brazil . C anada . M exico . Singap ore . Spain . Uniited Kingdom . United States Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User This is an electronic version of the print textbook. Due to electronic rights restrictions, some third party content may be suppressed. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. The publisher reserves the right to remove content from this title at any time if subsequent rights restrictions require it. For valuable information on pricing, previous editions, changes to current editions, and alternate formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for materials in your areas of interest. ...

Words: 58631 - Pages: 235

Premium Essay

Form

...educational mission of the University, the information, policies, procedures, regulations and requirements contained herein are continually being reviewed, changed and updated. Consequently, this document cannot be considered binding. Students are responsible for keeping informed of official policies and meeting all relevant requirements. When required changes to the Catalog occur, they will be communicated through catalog inserts and other means until a revised edition of the Catalog is published. The policies in this Catalog have been approved under the authority of the ECPI University Board of Trustees and, therefore, constitute official University policy. Students should become familiar with the policies in this Catalog. These policies outline both student rights and student responsibilities. The University reserves the right and authority at any time to alter any or all of the statements contained herein, to modify the requirements for admission and graduation, to change or discontinue programs of study, to amend any regulation or policy affecting the student body, to increase tuition and fees, to deny admission, to revoke an offer of admission and to dismiss from the University any student at any time, if it is deemed by the University to be in the best interest of the University, the University community, or the student to do so. The provisions of this publication are subject to change without notice and nothing in this publication may be considered as setting forth terms...

Words: 149595 - Pages: 599

Premium Essay

The Psychology Works

...Aptitude Testing and the Legal Profession 6 June 2011 Dr. Chris Dewberry Birkbeck, University of London 1 Acknowledgement: I wish to thank Chris Hutton for his help in compiling information in the section of this report entitled Aptitude Tests Currently Used in the Professional Services Sector, Appendix 3, and Appendix 4. 2 Contents Executive Summary ................................................................................................................... 6 The Background to this Report................................................................................................ 12 An Introduction to Aptitude and Aptitude Tests ..................................................................... 13 A Brief History of Psychological Ability Testing ....................................................................... 16 The Origins of Testing .......................................................................................................... 16 The Birth of the Modern Ability Test ................................................................................... 17 The Introduction of Group Testing ...................................................................................... 19 The New Science of Psychological Testing .......................................................................... 20 The Growth of the Ability and Aptitude Testing Industry ................................................... 20 Aptitudes and...

Words: 31453 - Pages: 126

Premium Essay

Ggao-09-232g

...United States Government Accountability Office GAO February 2009 GAO-09-232G FEDERAL INFORMATION SYSTEM CONTROLS AUDIT MANUAL (FISCAM) This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. United States Government Accountability Office Washington, DC 20548 February 2009 TO AUDIT OFFICIALS, CIOS, AND OTHERS INTERESTED IN FEDERAL AND OTHER GOVERNMENTAL INFORMATION SYSTEM CONTROLS AUDITING AND REPORTING This letter transmits the revised Government Accountability Office (GAO) Federal Information System Controls Audit Manual (FISCAM). The FISCAM presents a methodology for performing information system (IS) control 1 audits of federal and other governmental entities in accordance with professional standards, and was originally issued in January 1999. We have updated the FISCAM for significant changes affecting IS audits. This revised FISCAM reflects consideration of public comments received from professional accounting and auditing organizations, independent public accounting firms, state and local audit organizations, and interested individuals on the FISCAM Exposure Draft issued on July 31, 2008 (GAO-08-1029G)...

Words: 174530 - Pages: 699

Premium Essay

Jotun Case - Fudan University

...anTien Nguyen Amna Qureshi Rina Marie Abantao “Jotun - All the Colours in the World” Date: 04.06.2009 Program: Bachelor in International Marketing Fudan University & Norwegian School of Management “This paper is written as a part of the undergraduate program at BI Norwegian School of Management. This does not entail that BI Norwegian School of Management has cleared the methods applied, the results presented, nor the conclusions drawn” Jotun China – All the Colours in the World Executive summary Jotun Kemisk Fabrik A/S was founded in March 1926, operating only in Norway until 1962 when it began to expand internationally. Today Jotun operates in more than 70 countries, and is one of the world’s leading manufacturers of paints and coatings. Jotun has been in the Chinese market since 1983, initially focusing only on marine coatings and protective coatings where the brand became very successful. Encouraged by this, Jotun China decided to enter the Chinese decorative paint market in 2001 with the long term goal of becoming the market’s leading brand. However, after 8 years in the Chinese decorative paint market, Jotun China has not been able to replicate its previous successes. Therefore, we the authors of this thesis, working in collaboration with Jotun China staff, set out first to determine the viability of Jotun’s latest strategy for the Chinese decorative paint market, and second to suggest concrete steps to follow if and when executing this strategy. Our findings...

Words: 50097 - Pages: 201

Premium Essay

Business at It's Best

...Management Fall 2009 Non-financial risk assessment in mergers, acquisitions and investments Identifying sources of business risk in the ICT industry Bachelors thesis Erik Allenstr¨m, 1984-11-26 o Fredrik Njurell, 1984-01-30 ¨ Tutor: Osten Ohlsson January 14, 2010 Abstract The number of company mergers and acquisition activities has increased dramatically the last two decades. The reasons for conducting these activities are many and the uncertainties of their results are high. To reduce the uncertainties when making an investment, merger or acquisition it is vital to do a thorough assessment of the risks involved with the activity. This thesis focuses on a specific part of this risk assessment, namely the non-financial risks. Mergers and acquisitions are done in almost all industries around the world and the reasons for and benefits of these activities can vary between industries. We have chosen to investigate the risk assessment of non-financial risks in the Information and Communication Technology (ICT) industry. The thesis aims at investigating what business characteristics, for companies in the ICT industry, that give rise to non-financial risks that must be assessed when doing investments, mergers or acquisitions. Further on we present a risk pattern that points out what business characteristics that are the most important when conducting a risk assessment of non-financial risks on companies in the ICT industry. From a literature study we find evidence that ten different...

Words: 24602 - Pages: 99