Conduct a risk assessment and Develop security standards documentation
$8-15 USD / hour
已关闭
已发布将近 11 年前
$8-15 USD / hour
This assignment will be based on a made up scenario about a customer database development for internal website of the "Computer Repair Store" Send me a massage if you need more info. I have more assignments if you offer fair price and give me a good paper.
Instructions:
Prepare the Risk Assessment and Security Standards documentation for your project.
The risk assessment report will range from physical threats, lack of policy implementation and malicious security attacks.
Security Standards documentation include identification of organizational objectives, strategies, and policies, as well as determination of organizational security requirements. Discuss the controls and safeguards that are put in place by the organization to protect against threats, reduce vulnerabilities, risk, and support organizational objectives.
This document should follow a structured approach, and you should use the following outline. The items in BOLD should be your paragraph headings. What follows the headings should be the content of that section.
Make sure that all of the following are covered in your paper:
Risk Assessment: Document the vulnerabilities, threats and risks associated with your project.
Risk Likelihood and Impact: Rate the possibility of risk taking place and impact it would have upon organization, data integrity, public trust, and company value.
Organizational requirements: Security requirements of the organization. Topics may include administrative and physical safeguards to protect company and customer data.
Instructions:
Prepare the Risk Assessment and Security Standards documentation for your project.
The risk assessment report will range from physical threats, lack of policy implementation and malicious security attacks. For example, a fire and subsequent sprinkler system could damage servers, cabling, and the workstations. System vulnerabilities could be exposed due to not implementing remote OS authentication, providing unauthorized access to customer data. Or the lost laptop left at the airport security scanner with the passwords disabled could result in any number of circumstances for compromised data integrity.
Security Standards documentation include identification of organizational objectives, strategies, and policies, as well as determination of organizational security requirements. Discuss the controls and safeguards that are put in place by the organization to protect against threats, reduce vulnerabilities, risk, and support organizational objectives.
This document should follow a structured approach, and you should use the following outline. The items in BOLD should be your paragraph headings. What follows the headings should be the content of that section.
Make sure that all of the following are covered in your paper:
Risk Assessment: Document the vulnerabilities, threats and risks associated with your project.
Risk Likelihood and Impact: Rate the possibility of risk taking place and impact it would have upon organization, data integrity, public trust, and company value.
Organizational requirements: Security requirements of the organization. Topics may include administrative and physical safeguards to protect company and customer data.
Key Individuals and Access Rights: The key individuals who should have access to the system. Also address access rights for sub-contractors and any policies necessary to grant access on temporary basis.
Security Policies: Proposed security polices for the new system and details of any organization security requirements needed.
Security Items: Detailed suggestions of software, hardware, and other security measures required.
Budget Impact: How will the security costs increase the proposed budget, if at all?
Conclusion: Conclusion and reference page.
Greetings.
I have great experience in assessing and writing policies related to security engagements. It would be better to also assess and check the environment for a more solid deliverable, but it can be done anyway.
I work in one of the Big 5 Consulting Companies as an IT Security Architect. Please let me know.
Dear Hiring Manager,
Thank you for this wonderful opportunity.
Today Your job posting has caught my attention I have excellent experience in Website Development. I can finish this job within the necessary time frame. I am professional web developer. I will be serving you with all my hard work and skills.
I am expert in Wordpress, PHP, HTML, Drupal, Joomla, CSS and Opencart.
please check your pm for details
thanks
Hello,
I just graduated with my Masters degree in Information systems. I am used to working with IT scenarios. I would be happy to do this project for you. I can send examples of my work if needed. Please see my Portfolio.
Thank You,
Lisa