Do a bit of research on CWE, Common Weakness Enumeration.
Write a brief overview of their scoring system.
Pick one of common weaknesses identified on their site and describe it.
Your assignment should be 200-300 of your own words.
Do a bit of research on CWE, Common Weakness Enumeration.
Write a brief overview of their scoring system.
Pick one of common weaknesses identified on their site and describe it.
Your assignment should be 200-300 of your own words.
Purpose
This project provides an opportunity to apply the competencies gained in the lessons of this course to develop a risk management plan for a fictitious organization to replace its outdated plan.
Learning Objectives and Outcomes
You will gain an overall understanding of risk management, its importance, and critical processes required when developing a formal risk management plan for an organization.
Required Source Information and Tools
The following tools and resources that will be needed to complete this project:
Deliverables
As discussed in this course, risk management is an important process for all organizations. This is particularly true in information systems, which provides critical support for organizational missions. The heart of risk management is a formal risk management plan. The project activities described in this document allow you to fulfill the role of an employee participating in the risk management process in a specific business situation.
Submission Requirements
All project submissions should follow this format:
Scenario
You are an information technology (IT) intern working for Health Network, Inc. (Health Network), a fictitious health services organization headquartered in Minneapolis, Minnesota. Health Network has over 600 employees throughout the organization and generates $500 million USD in annual revenue. The company has two additional locations in Portland, Oregon and Arlington, Virginia, which support a mix of corporate operations. Each corporate facility is located near a co-location data center, where production systems are located and managed by third-party data center hosting vendors.
Company Products
Health Network has three main products: HNetExchange, HNetPay, and HNetConnect.
HNetExchange is the primary source of revenue for the company. The service handles secure electronic medical messages that originate from its customers, such as large hospitals, which are then routed to receiving customers such as clinics.
HNetPay is a Web portal used by many of the company’s HNetExchange customers to support the management of secure payments and billing. The HNetPay Web portal, hosted at Health Network production sites, accepts various forms of payments and interacts with credit-card processing organizations much like a Web commerce shopping cart.
HNetConnect is an online directory that lists doctors, clinics, and other medical facilities to allow Health Network customers to find the right type of care at the right locations. It contains doctors’ personal information, work addresses, medical certifications, and types of services that the doctors and clinics offer. Doctors are given credentials and are able to update the information in their profile. Health Network customers, which are the hospitals and clinics, connect to all three of the company’s products using HTTPS connections. Doctors and potential patients are able to make payments and update their profiles using Internet-accessible HTTPS Web sites.
Information Technology Infrastructure Overview
Health Network operates in three production data centers that provide high availability across the company’s products. The data centers host about 1,000 production servers, and Health Network maintains 650 corporate laptops and company-issued mobile devices for its employees.
Threats Identified
Upon review of the current risk management plan, the following threats were identified:
· Loss of company data due to hardware being removed from production systems
· Loss of company information on lost or stolen company-owned assets, such as mobile devices and laptops
· Loss of customers due to production outages caused by various events, such as natural disasters, change management, unstable software, and so on
· Internet threats due to company products being accessible on the Internet
· Insider threats
· Changes in regulatory landscape that may impact operations
Management Request
Senior management at Health Network has determined that the existing risk management plan for the organization is out of date and a new risk management plan must be developed. Because of the importance of risk management to the organization, senior management is committed to and supportive of the project to develop a new plan. You have been assigned to develop this new plan.
Additional threats other than those described previously may be discovered when re-evaluating the current threat landscape during the risk assessment phase.
The budget for this project has not been defined due to senior management’s desire to react to any and all material risks that are identified within the new plan. Given the company’s annual revenue, reasonable expectations can be determined.
Project Part 1 Task 2: Risk Assessment Plan
After creating an initial draft of the risk management plan, the second part of the assigned project requires you to create a draft of the risk assessment (RA) plan. To do so, you must:
Evaluation Criteria and Rubrics
Describe in 500 words the shared security responsibility model that a dba must be aware of when moving to the cloud.
Considering the importance of data in organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for your research paper.
Your paper should meet the following requirements:
Prior to beginning work on this interactive assignment, review any relevant information in this week’s lecture, review the Class of 2017 yearbook: The premier 100 technology leaders web page (https://www.computerworld.com/article/3154630/class-of-2017-yearbook-the-premier-100-technology-leaders.html) and select two leaders from their list. Compare their leadership strategies and analyze the differences between their two styles. Using examples, analyze the role each leader plays and explain how each leader’s information systems strategy impacts their organizations. Compare these leadership strategies to the IT leadership of an organization where you work or have worked and explain how the leadership in your organization could improve.
Your initial post should be a minimum of 300 words.
Discussion:
Malicious individuals have discovered several methods to attack and defeat cryptosystems. It’s important that understand the threats posed by cryptographic attacks to minimize the risks to your network systems.
Identify one cryptographic attack and how you can protect against it.
Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:
At least two scholarly sources should be used in the initial discussion thread.
Note: Answer should be minimum of 300 words
Infrastructure as a Service (IaaS) – Its is On Demand process, which access to virtualized It Infrastructure through internet.
How this Service helps in computing, networking, storage which helps Cloud providers maintain and monitor the physical infrastructure to deliver IaaS.
Main criteria for my research about Hoe this service helps current backbone clouds like AWS, that leverage it’s Enterprise in more focus on development and management and also how it is differentiated with PaaS
Detailed analysis and research needed to write in APA format with 4 pages with needed diagrams and references
Discussion:
What are the various technologies employed by wireless devices to maximize their use of the available radio frequencies? Also discuss methods used to secure 802.11 wireless networking in your initial thread.
At least one scholarly source should be used in the initial discussion thread. Use proper citations and references in your post.
Note: Answer should be a minimum of 300 words
Follow the instructions from attached
Summarize what you have learned over the last 9 weeks. Has it changed your opinion about technology? Do you believe technology will continue to evolve? What businesses should concerned about being “phased” out due to new technology?
Course
250 words