Question

In: Computer Science

write a Security Plan Proposal as a project draft document create a fictitious company and Briefly...

write a Security Plan Proposal as a project draft document

create a fictitious company and Briefly provide an overview/description of your fictitious company.

Identify and discuss the importance of risk assessment to the organization’s security framework? Discuss the five layers of risk.

Solutions

Expert Solution

Consider a company that works with different types of clients all across the world and offers the software as per their needs.

Importance of risk assessment to the security framework of the organization:

  • Risk assessment helps in identifying the security threats to the business of an organization in advance and helps in preventing it from occurring.
  • Finding the weaknesses of the system helps in taking precautionary measures and prevents the breakdown of the system.
  • Risk assessment helps in keeping the data safe and prevents it from losing. Risk assessment measures also increase awareness about the potential threats of the system and safeguard the data.
  • Sometimes employee habits, actions, and negligences can cause a threat to security inside the organization, awareness about the problems can help prevent those actions in the first place.
  • Different systems of the organization may require different ways of securing the system. Risk assessment helps in identifying potential and effective ways to secure these different systems.

Five layers of risk are as follows:

Layer 1:

  • The first layer of the risk is associated with external risks.
  • In most cases, these types of risks are dangerous to the business as they can shut down the business.
  • Examples are natural disasters, hurricanes, flooding, etc.
  • They affect the organization as well as the customers.

Layer 2:

  • The risk associated with this layer are risks of the facilities.
  • Facilities such as medical emergencies, electrical power, telephone wires, etc. are great utilities but their damage is also risky for the organization's business.

Layer 3:

  • These risks are related to data systems.
  • Different computers in the organization share different types of information along with performing various activities.
  • Data loss can cause legal problems in the organization.
  • Data systems should have their own level of security measures to keep the data of the company intact.

Layer 4:

  • These are departmental risks.
  • Every department of the company performs critical operations.
  • It is important for the organization to have all the departmental goals met.
  • Each department makes use of its own programs as well as tools to perform the tasks evenly.
  • The security risk to these programs as well as tools can cause overall performance degradation.

Layer 5:

  • This layer involves the System desk area.
  • These types of risks are related to tasks and jobs performed on the system and on the desk.
  • Keeping important documents on the desk, writing passwords, leaving the system logged in, etc. can expose a lot of sensitive data about the company.

Related Solutions

As a security manager or administrator of a fictitious company, write a Security Plan Proposal as...
As a security manager or administrator of a fictitious company, write a Security Plan Proposal as a project draft document. Briefly provide an overview/description of your fictitious company. Identify and discuss the importance of risk assessment to the organization’s security framework? Discuss the five layers of risk.
write a project proposal for a fictitious or a real project.
write a project proposal for a fictitious or a real project.
In this project, you’ll create a security infrastructure design document for a fictional organization. The security...
In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet the needs of the organization. Your work will be evaluated according to how well you met the organization’s requirements. About the organization: This fictional organization has a small, but growing, employee base, with 50 employees in one small office. The company is an online retailer of the world's finest artisanal, hand-crafted...
In this project, you’ll create a security infrastructure design document for a fictional organization. The security...
In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet the needs of the organization. Your work will be evaluated according to how well you met the organization’s requirements. About the organization: This fictional organization has a small, but growing, employee base, with 50 employees in one small office. The company is an online retailer of the world's finest artisanal, hand-crafted...
create a document in microsoft word or excel document which has the following: Fictitious names and...
create a document in microsoft word or excel document which has the following: Fictitious names and addresses of 10 folks including name, address and phone number. Recreate the bike table, which includes bike name, part number and hourly rate Please limit your submission to no more than 2 pages.
Please create a security infrastructure design document for afictional organization. Your plan will be evaluated...
Please create a security infrastructure design document for a fictional organization. Your plan will be evaluated according to how well you met the organization's requirements. Points will be awarded based on how well you met these requirements, considering the security implications of your choices. The following elements should be incorporated into your plan:-Authentication system-External website security-Internal website security-Remote access solution-Firewall and basic rules recommendations-Wireless security-VLAN configuration recommendations-Laptop security configuration-Application policy recommendations-Security and privacy policy recommendations-Intrusion detection or prevention for systems...
Assignment: In this project, you’ll create a security infrastructure design document for a fictional organization. The...
Assignment: In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet the needs of the organization. Your work will be evaluated according to how well you met the organization’s requirements. About the organization: This fictional organization has a small, but growing, employee base, with 50 employees in one small office. The company is an online retailer of the world's finest artisanal,...
Assignment: In this project, you’ll create a security infrastructure design document for a fictional organization. The...
Assignment: In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet the needs of the organization. Your work will be evaluated according to how well you met the organization’s requirements. About the organization: This fictional organization has a small, but growing, employee base, with 50 employees in one small office. The company is an online retailer of the world's finest artisanal,...
Draft a project proposal about AN agricultural project that you are about to start. Project 1:...
Draft a project proposal about AN agricultural project that you are about to start. Project 1: Goats farming (start with 100 Goats) Project 2: Crop farming (about 2.5 hectares), not fenced yet The proposal must be formal, well formatted and well articulated.
Write a systems engineering management plan (SEMP) for a project of your choice. The project proposal...
Write a systems engineering management plan (SEMP) for a project of your choice. The project proposal should consist of the following: Title page Executive Summary Document History Table of Contents Introduction Purpose Document Overview System Overview Project Schedule References System Engineering Processes Project Organization Environments Decision-Making Process System Engineering Model System Engineering Processes Configuration Management Requirements Engineering Functional Analysis Design Processes Development Processes Software Hardware System Integration Build Management Verification Validation Specialty Engineering System Deployment Site preparation System installation System...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT