Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Aircraft solutions course project

28/12/2020 Client: saad24vbs Deadline: 14 Days

Course Project: Security Assessment and Recommendations


Overview | Guidelines | Grading Rubrics | Best Practices



Overview



This course does involve a lot of technical information and theory, but what really matters is how this knowledge can be used to identify and remediate real-world security issues. What you learn in this course should be directly applicable to your work environment. The course project that you will complete is designed to further this goal. In the first part of the project, you will choose an organization from one of two given scenarios (below) and identify potential security weaknesses, and in the second part of the project, you will recommend solutions. The first part of the project is due in Week 3, and the second part of the project, along with the first part (presumably revised based on instructor feedback) is due in Week 6. This project constitutes a significant portion of your overall grade. This is an individual assignment and may not be completed in teams.



Guidelines



Phase I – Identify potential weaknesses from either the Aircraft Solutions or Quality Web Design Company


In this phase, you will choose either Aircraft Solutions or Quality Web Design as the company you will work with. The scenarios are in Doc Sharing in the Course Project select area. You will then identify potential security weaknesses.


Security weaknesses – You must choose two from the following three areas (hardware, software, and policy – excluding password policies) and identify an item that requires improved security.


To define the asset or policy with sufficient detail to justify your assessment, your assessment must include:


· the vulnerability associated with the asset or policy


· the possible threats against the asset or policy


· the likelihood that the threat will occur (risk)


· the consequences to mission critical business processes should the threat occur


· how the organization’s competitive edge will be affected should the threat occur


To clarify an item that requires improved security, you must identify one of these items:


· one hardware and one software weakness


· one hardware and one policy weakness


· one software and one policy weakness


Other required elements include:


· Cover sheet


· APA-style


· In-text citations and Reference section


· Minimum length 3 pages, maximum length 5 pages (not counting cover sheet, diagram(s), references). Do not exceed the maximum length.


Phase II: the Course Project (comprised of Phase I and II) – Recommend solutions to the potential weaknesses from either the Aircraft Solutions or Quality Web Design Company


In this phase of the project you will include Part I (presumably improved as needed based upon Week 3 feedback) and then you will recommend solutions for the security weaknesses you identified in the Phase I.


Definition of the solution – Hardware solutions must include vendor, major specifications with an emphasis on the security features, and location of placement with diagram. Software solutions must include vendor and major specifications, with an emphasis on security features. Policy solutions must include the complete portion of the policy that addresses the weakness identified. Any outsourced solution must include the above details and the critical elements of the service level agreement.


Justification – You must address the efficacy of the solution in terms of the identified threats and vulnerabilities; the cost of the solution, including its purchase (if applicable); and its implementation, including training and maintenance.


Impact on business processes – You must discuss any potential positive or negative effects of the solution on business processes and discuss the need for a trade-off between security and business requirements using quantitative rather than simply qualitative statements.


Other required elements include:


· Cover sheet


· APA-style


· In-text citations and Reference section


· 5 reference minimum


· Minimum length of solutions: 6 pages, maximum length 10 pages (not counting cover sheet, diagram(s), references). Do not exceed the maximum length.



Grading Rubrics



The course project will consist of two deliverables:


Phase I (Identify potential weaknesses from either the Aircraft Solutions or Quality Web Design Company); and Phase II: the Course Project (comprised of Phases I and II - Recommend solutions to the potential weaknesses from either the Aircraft Solutions or Quality Web Design Company).


The grading standards for each deliverable are as follows:


Phase I (Identify potential weaknesses from either the Aircraft Solutions or Quality Web Design Company)


Category


Points


Description


Security Weaknesses


 80


Identifies two plausible and significant weaknesses from required list (hardware, software, policy). Includes realistic vulnerability(s) associated with the asset or policy, plausible and likely threats against the asset or policy, an estimation of the likelihood that the threat will occur (risk), the consequences to mission critical business processes should the threat occur, and how the organization’s competitive edge will be affected should the threat occur.


Presentation


 20


Writing quality and flow demonstrates a graduate-level writing competency and does not contain misspellings, poor grammar, incorrect punctuation, and questionable sentence structure (syntax errors).


Total


100


A quality paper will meet or exceed all of the above requirements.


Phase II – the Course Project (comprised of Phase I and II) – Recommend solutions to the potential weaknesses from either the Aircraft Solutions or Quality Web Design Company


Category


Points


Description


Security Weaknesses


 60


Identifies two plausible and significant weaknesses from required list (hardware, software, policy). Includes realistic vulnerability(s) associated with the asset or policy, plausible and likely threats against the asset or policy, an estimation of likelihood that the threat will occur (risk), the consequences to mission critical business processes should the threat occur, and how the organization’s competitive edge will be affected should the threat occur


Definition of Solution


 30


Includes vendor and major specifications, and identifies the relevant security features as related to the weakness identified. If hardware, includes location of placement with diagram. Policy solutions include the complete portion of the policy that effectively address the weakness identified. Any outsourced solution must include the above details and the critical elements of the service level agreement.


Justification


 30


Demonstrates the efficacy of the solution in terms of the identified threats and vulnerabilities. Includes complete costs, including purchase, implementation, training, and maintenance as needed.


Impact on Business Processes


 25


Addresses plausible, potential positive, or negative effects on business processes. Discusses trade-off between security and business requirements using quantitative statements.


Presentation


 25


Writing quality and flow demonstrates a graduate-level writing competency and does not contain misspellings, poor grammar, incorrect punctuation, and questionable sentence structure (syntax errors).


Total


 170


A quality paper will meet or exceed all of the above requirements.





Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

University Coursework Help
Helping Hand
Homework Guru
Top Essay Tutor
Writer Writer Name Offer Chat
University Coursework Help

ONLINE

University Coursework Help

Hi dear, I am ready to do your homework in a reasonable price.

$37 Chat With Writer
Helping Hand

ONLINE

Helping Hand

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$35 Chat With Writer
Homework Guru

ONLINE

Homework Guru

Hi dear, I am ready to do your homework in a reasonable price and in a timely manner.

$37 Chat With Writer
Top Essay Tutor

ONLINE

Top Essay Tutor

I have more than 12 years of experience in managing online classes, exams, and quizzes on different websites like; Connect, McGraw-Hill, and Blackboard. I always provide a guarantee to my clients for their grades.

$40 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

All yellow uno cards - Microsoft word project - Five phases of project management - Which of the following accounts appear on the balance sheet - Steam is compressed from mpa and - The gaap matching principle requires revenues to be matched with - 15241 beeding street charlotte nc - 2 informative speech topic ideas with outlines on each topic (please read posted instructions) - Philosophy - Blackbody curves and ubv filters lab answers - Compare and contrast two different air traffic control entities - In defense of mind body dualism - Iready scale score explanation - 978 0 07 352994 3 - Homework help for college students - Tanto - House of grace haifa - Murdocks 4 functions of the family - The quantities s and t are positive - Case study 3 - Visual communication in the media rasmussen - Patterson lakes boat ramp - Hw-zty - Risk management competency framework - What is current audit file - Esl scales and learning progressions - Weather forecast line graph - Application Essay - Letterhead and Memo Template - Hampden park public school - Violence - Volkswagen ethical issues case study - Don t know much about history cover - Chemical hazard symbols worksheet - Ardex na data sheet - The essential theater 11th edition - How to identify the precipitate in a reaction - Powerpoint - Jackie schechter slinky brand - High table dinner hku dress code - Brain Injuries and Methods of Rehabilitation After Them - What is a metaparadigm of nursing - 5 ps of sports marketing - A maternity line for American Apparel - Lync online web app - Cheech and peppes upper east side - Harvard 3 minute step test - Enthalpy change of neutralisation experiment - Invasive species online game - Chap. 3 Q MC - Rumelt's criteria for evaluating strategies example - Full penetration on netflix 2017 - Estimating can be challenged by - Generating hydrogen gas lab answers - Wk 2 - Market Segmentation and Buyer Behavior Presentation - What are the three main goals of compensation departments - Models for writers short essays for composition 13th edition pdf - Identify learning styles and generational characteristics - How to install arulesviz package in r - The aufbau principle states that an electron - Is fast food to blame for obesity essay - Marketing Strategy - European humanities - Vicente y francisco jugar al vóleibol los domingos - Hospital Application: Leadership Theories - Discussion 2: Predictor Effectiveness in Criterion Measure Estimation - Electromagnetic radiation spectrum poster - Discussion - The kgb and the world pdf download - What is an appendix in a research paper - Ndis participant portal login - A story of an hour pdf - Https www openintro org stat textbook php - Assignment - The composite shaft consisting of aluminum copper and steel - Are psychopaths more likely to exhibit criminal behavior - Ice cream experiment lesson plans - Spence children's anxiety scale report - Solution-Focused Brief Therapy - Quession - Nur634d5q1 - 00358 telephone country code - Hildegard's play of virtues is - Safety root cause analysis template - Is photosynthesis endergonic or exergonic - The talos principle wiki - Briefly summarize isaiah 53 4 6 - Hotel park and fly toronto groupon - Shoretel phone system manual - Elements of morality play - Business Intelligence(Assign) - Mechanics of materials gere 9th edition pdf - Cheque book request letter - Jonathan gruber public finance and public policy pdf - Archetype examples in movies - 5-2 Information Technology Risk Analysis and Cyber Security Policy Assignment, Part 2 - OSI and TCP/IP Models - 8week6A - Electricity transfer application form - In the service system design matrix