Mid-Term

Your midterm project was to provide a security assessment for [X], an online software company that specializes in selling ad spaces in their parent company’s magazine.  [X] manages an online database that allows their customers to upload and pay for their business ads for magazine placement.  Because [X] ‘s database needs to connect to the parent company’s database, the parent company has requested that [X] system be assessed and verified as secure.

Now that you have provided your security assessment, the next step is to provide [X] with your Security Portfolio. Using this week’s Reading on the NIST framework that includes the 5-step process for creating a balanced portfolio of security products, your assignment will be to create a Security Portfolio with the following sections:

(Note: [X] can be any company and any line of business)

1. Cover Page (i.e. APA title page)  

2. Background (provide a synopsis of your midterm security assessment on Vestige)  

3. For each security need identified (or needs to be identified) from your Midterm Assignment, Find the products that will deliver the needed capabilities for the right price and tell why you chose that product.

This assignment should be about security needs only.  Do NOT discuss how the client can achieve more business (That is not your job).

Answer the questions with an APA-formatted paper (Title page, body, and references only).  Your response should have a minimum of 600 words.  Count the words only in the body of your response, not the references.  A table of contents and abstracts are not required.

A minimum of two references is required. One reference for the book is acceptable but multiple references are allowed.  There should be multiple citations within the body of the paper.  Note that an in-text citation includes the author’s name, year of publication, and the page number where the paraphrased material is located.

Your paper must be submitted to SafeAssign.  The resulting score should not exceed 35%.

NOTE: Please find related content in Chapter 12 from textbook Securing Systems: Applied Security Architecture and Threat Models.

NOTE: I have attached the Mid Term project for reference.

Tags: No tags