Find Jobs
Hire Freelancers

Conduct risk assessment and develop security standards documentation

$2-8 USD / hour

Cancelado
Publicado há aproximadamente 11 anos

$2-8 USD / hour

Instructions: Prepare the Risk Assessment and Security Standards documentation for your project. Which is creation of a new customer database for an internal website of a computer repair store. The risk assessment report will range from physical threats, lack of policy implementation and malicious security attacks. For example, a fire and subsequent sprinkler system could damage servers, cabling, and the workstations. System vulnerabilities could be exposed due to not implementing remote OS authentication, providing unauthorized access to customer data. Or the lost laptop left at the airport security scanner with the passwords disabled could result in any number of circumstances for compromised data integrity. Security Standards documentation include identification of organizational objectives, strategies, and policies, as well as determination of organizational security requirements. Discuss the controls and safeguards that are put in place by the organization to protect against threats, reduce vulnerabilities, risk, and support organizational objectives. This document should follow a structured approach, and you should use the following outline. The items in BOLD should be your paragraph headings. What follows the headings should be the content of that section. Make sure that all of the following are covered in your paper:  Risk Assessment: Document the vulnerabilities, threats and risks associated with your project.  Risk Likelihood and Impact: Rate the possibility of risk taking place and impact it would have upon organization, data integrity, public trust, and company value.  Organizational requirements: Security requirements of the organization. Topics may include administrative and physical safeguards to protect company and customer data. Project Grading Rubric Course: IT499 Unit: 6 Points: 100 Copyright Kaplan University  Key Individuals and Access Rights: The key individuals who should have access to the system. Also address access rights for sub-contractors and any policies necessary to grant access on temporary basis.  Security Policies: Proposed security polices for the new system and details of any organization security requirements needed.  Security Items: Detailed suggestions of software, hardware, and other security measures required.  Budget Impact: How will the security costs increase the proposed budget, if at all?  Conclusion: Conclusion and reference page.
ID do Projeto: 4472441

Sobre o projeto

Projeto remoto
Ativo há 11 anos

Quer ganhar algum dinheiro?

Benefícios de ofertar no Freelancer

Defina seu orçamento e seu prazo
Seja pago pelo seu trabalho
Descreva sua proposta
É grátis para se inscrever e fazer ofertas em trabalhos

Sobre o cliente

Bandeira do(a) UNITED STATES
United States
0,0
0
Método de pagamento verificado
Membro desde abr. 27, 2013

Verificação do Cliente

Obrigado! Te enviamos um link por e-mail para que você possa reivindicar seu crédito gratuito.
Algo deu errado ao enviar seu e-mail. Por favor, tente novamente.
Usuários Registrados Total de Trabalhos Publicados
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 142 189 759)
Copyright © 2024 Freelancer Technology Pty Limited (ACN 142 189 759)
Carregando pré-visualização
Permissão concedida para Geolocalização.
Sua sessão expirou e você foi desconectado. Por favor, faça login novamente.