NR 543 W7 Security Assessment Assignment Faqs

Sample Answer for NR 543 W7 Security Assessment Assignment Faqs Included After Question

NR 543 W7 Security Assessment Assignment Faqs

NR 543 W7 Security Assessment Assignment Faqs

f you have a Study.com College Saver membership and are seeking college credit for this course, you must submit an assignment and pass the proctored final exam. You must submit your assignment before registering for the final. Below you will find prompts and instructions for submitting your assignment. Updated: 03/01/2023

The status of Computer Science 203 as an ACE credit-recommended course will expire on April 30th, 2023. You must complete the course in its entirety (including all lessons, assignments, and the final exam) by Sunday, 4/30/2023 in order to receive ACE-recommended credit. If you do not complete the course by the end of the day on 4/30/2023, you will not be able to receive credit for the course.

Online Nursing Essays

Struggling to Meet Your Deadline?

Get your assignment on NR 543 W7 Security Assessment Assignment Faqs done on time by medical experts. Don’t wait – ORDER NOW!

About this Assignment

Defensive security involves focusing on reactive measures to breaches and includes processes such as finding system vulnerabilities, patching security flaws, and retiring software that introduces excess risk into an environment. For this assignment, you will be given a networked information system with an access control matrix. You need to conduct a risk assessment by evaluating network security threats, physical media vulnerabilities and auditing system security. You will then deliver a 1,000-1,500 word report detailing the types of risk discovered. Your report should also include the creation of a contingency plan for breach or failure.

793 views

Scenario

The Book Blazer Publishing Company just found out they may have been hacked! They have been concerned for quite some time that a competitor has been stealing book ideas from their content management system (CMS). As the city’s premier security consultant, they retain you to verify whether this is true or not. You are given an architecture diagram of the CMS which consists of:

  1. Web server to house the web site front-end
  2. Application server to provide data processing functions
  3. SQL server to house content metadata
  4. File server on which content is stored
  5. Firewall to protect the system
  6. VPN appliance so employees can reach the CMS from the outside

You are also provided the following access control matrix showing each group and what access they have to each component:

GroupWeb ServerApp ServerDatabase ServerFile ServerFirewallVPN
AdminAllAllAllAllAllAll
MarketingRead/WriteRead OnlyRead OnlyAllNoneRead Only
PublishingRead/WriteRead/WriteRead/WriteRead/WriteNoneRead Only
General EmployeeRead OnlyRead OnlyRead OnlyAllNoneRead Only

After conducting a risk assessment by evaluating network security threats, physical media vulnerabilities and auditing system security, you are able to verify their worst fears! To help the CEO and CIO understand what is happening, you will need to deliver a 1,000-1,500 word report detailing the types of risk discovered. Your report should also include the creation of a contingency plan for breach or failure.

Formatting & Sources

Please write your paper in the MLA format. You may refer to the course material for supporting evidence, but you must also use 3 other sources and cite them using the MLA format. Please include a mix of both primary and secondary sources, with at least one source from a security journal. If you use any Study.com lessons as sources, please also cite them in MLA (including the lesson title and instructor’s name).

  • Primary sources are first-hand accounts such as interviews, advertisements, speeches, company documents, statements, and press releases published by the company in question.
  • Secondary sources come from bodies such as the National Institute of Standards and Technology (NIST). You may use sources like JSTOR or Google Scholar to find articles from these journals. Secondary sources may also come from reputable websites with .gov, .edu, or .org in the domain. (Wikipedia is not a reputable source, though the sources listed in Wikipedia articles may be acceptable.)

If you’re unsure about how to use the MLA format to cite your sources, please see the following lessons:

A Sample Answer For the Assignment: NR 543 W7 Security Assessment Assignment Faqs

Title: NR 543 W7 Security Assessment Assignment Faqs

Don’t wait until the last minute

Fill in your requirements and let our experts deliver your work asap.