Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Aircraft solutions course project

28/12/2020 Client: saad24vbs Deadline: 14 Days

Course Project: Security Assessment and Recommendations


Overview | Guidelines | Grading Rubrics | Best Practices



Overview



This course does involve a lot of technical information and theory, but what really matters is how this knowledge can be used to identify and remediate real-world security issues. What you learn in this course should be directly applicable to your work environment. The course project that you will complete is designed to further this goal. In the first part of the project, you will choose an organization from one of two given scenarios (below) and identify potential security weaknesses, and in the second part of the project, you will recommend solutions. The first part of the project is due in Week 3, and the second part of the project, along with the first part (presumably revised based on instructor feedback) is due in Week 6. This project constitutes a significant portion of your overall grade. This is an individual assignment and may not be completed in teams.



Guidelines



Phase I – Identify potential weaknesses from either the Aircraft Solutions or Quality Web Design Company


In this phase, you will choose either Aircraft Solutions or Quality Web Design as the company you will work with. The scenarios are in Doc Sharing in the Course Project select area. You will then identify potential security weaknesses.


Security weaknesses – You must choose two from the following three areas (hardware, software, and policy – excluding password policies) and identify an item that requires improved security.


To define the asset or policy with sufficient detail to justify your assessment, your assessment must include:


· the vulnerability associated with the asset or policy


· the possible threats against the asset or policy


· the likelihood that the threat will occur (risk)


· the consequences to mission critical business processes should the threat occur


· how the organization’s competitive edge will be affected should the threat occur


To clarify an item that requires improved security, you must identify one of these items:


· one hardware and one software weakness


· one hardware and one policy weakness


· one software and one policy weakness


Other required elements include:


· Cover sheet


· APA-style


· In-text citations and Reference section


· Minimum length 3 pages, maximum length 5 pages (not counting cover sheet, diagram(s), references). Do not exceed the maximum length.


Phase II: the Course Project (comprised of Phase I and II) – Recommend solutions to the potential weaknesses from either the Aircraft Solutions or Quality Web Design Company


In this phase of the project you will include Part I (presumably improved as needed based upon Week 3 feedback) and then you will recommend solutions for the security weaknesses you identified in the Phase I.


Definition of the solution – Hardware solutions must include vendor, major specifications with an emphasis on the security features, and location of placement with diagram. Software solutions must include vendor and major specifications, with an emphasis on security features. Policy solutions must include the complete portion of the policy that addresses the weakness identified. Any outsourced solution must include the above details and the critical elements of the service level agreement.


Justification – You must address the efficacy of the solution in terms of the identified threats and vulnerabilities; the cost of the solution, including its purchase (if applicable); and its implementation, including training and maintenance.


Impact on business processes – You must discuss any potential positive or negative effects of the solution on business processes and discuss the need for a trade-off between security and business requirements using quantitative rather than simply qualitative statements.


Other required elements include:


· Cover sheet


· APA-style


· In-text citations and Reference section


· 5 reference minimum


· Minimum length of solutions: 6 pages, maximum length 10 pages (not counting cover sheet, diagram(s), references). Do not exceed the maximum length.



Grading Rubrics



The course project will consist of two deliverables:


Phase I (Identify potential weaknesses from either the Aircraft Solutions or Quality Web Design Company); and Phase II: the Course Project (comprised of Phases I and II - Recommend solutions to the potential weaknesses from either the Aircraft Solutions or Quality Web Design Company).


The grading standards for each deliverable are as follows:


Phase I (Identify potential weaknesses from either the Aircraft Solutions or Quality Web Design Company)


Category


Points


Description


Security Weaknesses


 80


Identifies two plausible and significant weaknesses from required list (hardware, software, policy). Includes realistic vulnerability(s) associated with the asset or policy, plausible and likely threats against the asset or policy, an estimation of the likelihood that the threat will occur (risk), the consequences to mission critical business processes should the threat occur, and how the organization’s competitive edge will be affected should the threat occur.


Presentation


 20


Writing quality and flow demonstrates a graduate-level writing competency and does not contain misspellings, poor grammar, incorrect punctuation, and questionable sentence structure (syntax errors).


Total


100


A quality paper will meet or exceed all of the above requirements.


Phase II – the Course Project (comprised of Phase I and II) – Recommend solutions to the potential weaknesses from either the Aircraft Solutions or Quality Web Design Company


Category


Points


Description


Security Weaknesses


 60


Identifies two plausible and significant weaknesses from required list (hardware, software, policy). Includes realistic vulnerability(s) associated with the asset or policy, plausible and likely threats against the asset or policy, an estimation of likelihood that the threat will occur (risk), the consequences to mission critical business processes should the threat occur, and how the organization’s competitive edge will be affected should the threat occur


Definition of Solution


 30


Includes vendor and major specifications, and identifies the relevant security features as related to the weakness identified. If hardware, includes location of placement with diagram. Policy solutions include the complete portion of the policy that effectively address the weakness identified. Any outsourced solution must include the above details and the critical elements of the service level agreement.


Justification


 30


Demonstrates the efficacy of the solution in terms of the identified threats and vulnerabilities. Includes complete costs, including purchase, implementation, training, and maintenance as needed.


Impact on Business Processes


 25


Addresses plausible, potential positive, or negative effects on business processes. Discusses trade-off between security and business requirements using quantitative statements.


Presentation


 25


Writing quality and flow demonstrates a graduate-level writing competency and does not contain misspellings, poor grammar, incorrect punctuation, and questionable sentence structure (syntax errors).


Total


 170


A quality paper will meet or exceed all of the above requirements.





Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

University Coursework Help
Helping Hand
Homework Guru
Top Essay Tutor
Writer Writer Name Offer Chat
University Coursework Help

ONLINE

University Coursework Help

Hi dear, I am ready to do your homework in a reasonable price.

$37 Chat With Writer
Helping Hand

ONLINE

Helping Hand

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$35 Chat With Writer
Homework Guru

ONLINE

Homework Guru

Hi dear, I am ready to do your homework in a reasonable price and in a timely manner.

$37 Chat With Writer
Top Essay Tutor

ONLINE

Top Essay Tutor

I have more than 12 years of experience in managing online classes, exams, and quizzes on different websites like; Connect, McGraw-Hill, and Blackboard. I always provide a guarantee to my clients for their grades.

$40 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Busn 319 marketing plan - One way to make an inductive argument weaker is to __________. - Six sigma green belt project examples ppt - Auscap long short australian equities fund - Aldol condensation lab report - Paper of finance - Handbook of informatics for nurses & healthcare professionals free pdf - Vertical integration is going backward on an industry's value chain - Why were the ottomans such successful conquerors - Math 221 devry week 3 quiz - IOP 460: Organizational Cultures, Discussion Response (1) - Module b critical study of literature questions - Patient teaching plan for nursing students - Defined benefit scheme unisuper - Bank management printers inc produces luxury checkbooks - Describe the eight steps in the decision making process - Benchmark – Organizational Structure - How does a colorimeter measure concentration - Biblical allusions in literature - Pre-Calculus homework ONLINE 100 to finish - Tant que vivray translation - Cert ii in electrotechnology pre apprenticeship - Adrenaline renewal flask rs3 - Managerial economics and strategy 3rd edition - Watch video and write a summary2 - Blackwattle bay high school - Health communications - Neher mcgrath calculation excel - Tompkins and cheney's organizational control theory - Visualizing and communicating in Excel - How to calculate average voltage of square wave - Tesla brand audit - Teradata logical data model - Econ 312 week 1 quiz - Employment Law - The sum of three consecutive even integers is - Application to general manager - Mac vs dac vs rbac - Creative curriculum group planning form - Coca cola balanced scorecard - Business studies marketing report - 6es7 138 4ca00 0aa0 manual - Tallinn university summer school - What is true power measured in - Individual Project(2 different copies needed) - A person who plays sports - Newsgothicbt romancondensed - Jealous husband returns in form of parrot character analysis - Shenton college music program - Legal 500 Assignment 2 - Describe the habits of successful interface designers - Consent order examples australia - Negligence and malpractice - 2 - Array to cluster labview - 18b smarts crescent burraneer - Unit 10 discussion - 7 4 puzzle letter scramble properties of logarithms answers - How technology-based leadership has driven the digital age. Also, that the role of technology leadership incorporates with the Technology Acceptance Model (TAM). - Confucius lives next door cliff notes - Wil's grill case analysis - How do i log into my hotmail account now - Business Math (Inventory development plan) - Proactive approaches to behavioral challenges - Unit 5 Assessment - Environmental Literacy Plan – Phase V - Mail phcn vic gov au - List and describe the three major categories of business reports. - When was new coke introduced - Sports inventory sheet - Taeass502 assessment examples - Essay - Hall farm nursery hargham - The body stores excess protein as - 5/88 alt street ashfield - Authentic assessment grew out of a concern that - Examples of systems in everyday life - C.wright mills claimed that the sociological imagination transformed - Lagaan once upon a time in india worksheet - Assume the speed of vehicles along a stretch of i-10 has an approximately - Structured Product Explanation (Investment Planning) - 300 words - Fundamental principles of statistics - Data Visualization - Hotel saville south yarra - Can a food handler taste food to adjust seasoning quizlet - Draft exam timetable mq - Categories of critical to quality characteristics - John trimble writing with style - Implementation Plan - Improving your writing penn foster exam - Bocam park pencoed jobs - 817 808 9836 - Korn ferry interview architect interview guide - The interventricular septum forms a dividing wall between the __________. - Villanova lean six sigma certification exam - Sin and grace in christian counseling summary - 25 st clair road wantirna south - Individual Written Report - Behold the dreamers discussion questions - Disconnect reconnect course tafe