Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Aircraft solutions course project

28/12/2020 Client: saad24vbs Deadline: 24 Hours

Course Project: Security Assessment and Recommendations


Overview | Guidelines | Grading Rubrics | Best Practices



Overview



This course does involve a lot of technical information and theory, but what really matters is how this knowledge can be used to identify and remediate real-world security issues. What you learn in this course should be directly applicable to your work environment. The course project that you will complete is designed to further this goal. In the first part of the project, you will choose an organization from one of two given scenarios (below) and identify potential security weaknesses, and in the second part of the project, you will recommend solutions. The first part of the project is due in Week 3, and the second part of the project, along with the first part (presumably revised based on instructor feedback) is due in Week 6. This project constitutes a significant portion of your overall grade. This is an individual assignment and may not be completed in teams.



Guidelines



Phase I – Identify potential weaknesses from either the Aircraft Solutions or Quality Web Design Company


In this phase, you will choose either Aircraft Solutions or Quality Web Design as the company you will work with. The scenarios are in Doc Sharing in the Course Project select area. You will then identify potential security weaknesses.


Security weaknesses – You must choose two from the following three areas (hardware, software, and policy – excluding password policies) and identify an item that requires improved security.


To define the asset or policy with sufficient detail to justify your assessment, your assessment must include:


· the vulnerability associated with the asset or policy


· the possible threats against the asset or policy


· the likelihood that the threat will occur (risk)


· the consequences to mission critical business processes should the threat occur


· how the organization’s competitive edge will be affected should the threat occur


To clarify an item that requires improved security, you must identify one of these items:


· one hardware and one software weakness


· one hardware and one policy weakness


· one software and one policy weakness


Other required elements include:


· Cover sheet


· APA-style


· In-text citations and Reference section


· Minimum length 3 pages, maximum length 5 pages (not counting cover sheet, diagram(s), references). Do not exceed the maximum length.


Phase II: the Course Project (comprised of Phase I and II) – Recommend solutions to the potential weaknesses from either the Aircraft Solutions or Quality Web Design Company


In this phase of the project you will include Part I (presumably improved as needed based upon Week 3 feedback) and then you will recommend solutions for the security weaknesses you identified in the Phase I.


Definition of the solution – Hardware solutions must include vendor, major specifications with an emphasis on the security features, and location of placement with diagram. Software solutions must include vendor and major specifications, with an emphasis on security features. Policy solutions must include the complete portion of the policy that addresses the weakness identified. Any outsourced solution must include the above details and the critical elements of the service level agreement.


Justification – You must address the efficacy of the solution in terms of the identified threats and vulnerabilities; the cost of the solution, including its purchase (if applicable); and its implementation, including training and maintenance.


Impact on business processes – You must discuss any potential positive or negative effects of the solution on business processes and discuss the need for a trade-off between security and business requirements using quantitative rather than simply qualitative statements.


Other required elements include:


· Cover sheet


· APA-style


· In-text citations and Reference section


· 5 reference minimum


· Minimum length of solutions: 6 pages, maximum length 10 pages (not counting cover sheet, diagram(s), references). Do not exceed the maximum length.



Grading Rubrics



The course project will consist of two deliverables:


Phase I (Identify potential weaknesses from either the Aircraft Solutions or Quality Web Design Company); and Phase II: the Course Project (comprised of Phases I and II - Recommend solutions to the potential weaknesses from either the Aircraft Solutions or Quality Web Design Company).


The grading standards for each deliverable are as follows:


Phase I (Identify potential weaknesses from either the Aircraft Solutions or Quality Web Design Company)


Category


Points


Description


Security Weaknesses


 80


Identifies two plausible and significant weaknesses from required list (hardware, software, policy). Includes realistic vulnerability(s) associated with the asset or policy, plausible and likely threats against the asset or policy, an estimation of the likelihood that the threat will occur (risk), the consequences to mission critical business processes should the threat occur, and how the organization’s competitive edge will be affected should the threat occur.


Presentation


 20


Writing quality and flow demonstrates a graduate-level writing competency and does not contain misspellings, poor grammar, incorrect punctuation, and questionable sentence structure (syntax errors).


Total


100


A quality paper will meet or exceed all of the above requirements.


Phase II – the Course Project (comprised of Phase I and II) – Recommend solutions to the potential weaknesses from either the Aircraft Solutions or Quality Web Design Company


Category


Points


Description


Security Weaknesses


 60


Identifies two plausible and significant weaknesses from required list (hardware, software, policy). Includes realistic vulnerability(s) associated with the asset or policy, plausible and likely threats against the asset or policy, an estimation of likelihood that the threat will occur (risk), the consequences to mission critical business processes should the threat occur, and how the organization’s competitive edge will be affected should the threat occur


Definition of Solution


 30


Includes vendor and major specifications, and identifies the relevant security features as related to the weakness identified. If hardware, includes location of placement with diagram. Policy solutions include the complete portion of the policy that effectively address the weakness identified. Any outsourced solution must include the above details and the critical elements of the service level agreement.


Justification


 30


Demonstrates the efficacy of the solution in terms of the identified threats and vulnerabilities. Includes complete costs, including purchase, implementation, training, and maintenance as needed.


Impact on Business Processes


 25


Addresses plausible, potential positive, or negative effects on business processes. Discusses trade-off between security and business requirements using quantitative statements.


Presentation


 25


Writing quality and flow demonstrates a graduate-level writing competency and does not contain misspellings, poor grammar, incorrect punctuation, and questionable sentence structure (syntax errors).


Total


 170


A quality paper will meet or exceed all of the above requirements.





Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Top Essay Tutor
Homework Guru
University Coursework Help
Helping Hand
Writer Writer Name Offer Chat
Top Essay Tutor

ONLINE

Top Essay Tutor

I have more than 12 years of experience in managing online classes, exams, and quizzes on different websites like; Connect, McGraw-Hill, and Blackboard. I always provide a guarantee to my clients for their grades.

$115 Chat With Writer
Homework Guru

ONLINE

Homework Guru

Hi dear, I am ready to do your homework in a reasonable price and in a timely manner.

$112 Chat With Writer
University Coursework Help

ONLINE

University Coursework Help

Hi dear, I am ready to do your homework in a reasonable price.

$112 Chat With Writer
Helping Hand

ONLINE

Helping Hand

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$110 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

What are coincident lines - Strategic management of apple inc and samsung group - Database design language dbdl is a programming language - Penn foster self check answers - Silica gel packets officeworks - Managing and using information systems 5th edition pdf - Ozito rotary tool rtp 163 - Persuasive Essay (Compensation Management) - 2015 wace english exam - Four elements of fitness programs issa - Free appliances for disabled - An income statement of a manufacturer - NRS-410V-0L191 Pathophisiology and Nursing Management of Client Health. - Clive peeters braybrook - Analytics an hour a day - Legal admission board qld - Comment - Chromium vi sulfide formula - 4 bit dac circuit - Political science - Appraise costing and financial strategies for manufacturing and service companies. - Bistec en cazuela nitza villapol - Javis 20 - How to tame a wild tongue questions and answers - Where is b43 postcode - How to work out hire purchase - How to persuade someone to donate blood - What is teel structure - A christmas carol stave 2 questions and answers pdf - Three basic principles of the belmont report - Why should the melting point sample be finely powdered - Hp serial number decoder - An electric motor worksheet answers - Determine the required value of the missing probability - Managerial economics - Floor plan standard measurements - How to cite the ib chemistry data booklet - Math Quiz - Post2 - Math assignments - 1002 2 - Ucumberlands blackboard login - Converging and diverging tectonic plates - Discussion Board - Binghamton city school district - Coriolis effect lab answers - How to draw mohr's circle for triaxial test - Open ended questions in nursing - Animal farm argumentative essay prompts - Brisbane city council cabbage tree creek - Renaissance and mannerism in cinquecento italy - Isometric drawing 45 degree angle - French Revolution have on terrorism - Language techniques in lord of the flies - The six dimensions of health - Air university style and author guide - Saudi power transformers company - Www sociosite net topics sociologists php - Ikea saudi arabia sale - Internal and external respiration - What role do audiences play in creating popular culture - Discussion Board- Sex Offender - Professional capstone and practicum reflective journal and scholarly activities - Clints - Plato's allegory of the cave painting - If you were a flavor what would it be - Unit I Discussion Board - Biostatistics - Yellow flame bunsen burner - Discussion - Learn and develop mariecuriecancercare - 3-4 paragraph essay for Business - Counter narrative examples - Oh molecular orbital diagram - Southwest mergers and acquisitions - A newtonian fluid having a specific gravity of 0.92 - Gross moment of inertia t beam - Ethical subjectivism - Https www youtube com watch v trf27f2bn a - 9. read 1 corinthians 15:42-57 and list three characteristics of the glorified state. - One discussion and 2 replies - Standardization of naoh with khp lab report - Competition between target and walmart swot analysis - Stanford prison experiment timeline - Validating node self description database riverbed - Boba interview questions - Case analysis 2 - What is the heidelberg school - MC Wk 5 Journal article - Your company assembles five different models - How does the producer offset work - Advancing - Higher italian past papers - Itec ashton under lyne - Cash and carry us history - A nondiscriminating pure monopolist is generally viewed as - Higgins 5 factor model - Worldpay dummy card details - General protections involving dismissal - Discussion board