Given the diagram, how you would protect these systems? This project will help you understand how to assess risk given gaps in systems. Please view the Attack Surfaces video. This video is from...

1 answer below »

Given the diagram, how you would protect these systems? This project will help you understand how to assess risk given gaps in systems. Please view the Attack Surfaces video. This video is from another course entitled, Planning, Auditing, and Maintenance, and is geared towards system management, however I have included it in this course. So, picture yourself in the eyes of the information technology department who is trying to get systems into production.


Background: You are an employee of the information technology department. Your organization just bought out a smaller competitor, and senior leadership wants you to integrate their systems with yours. There is one problem. They let everyone in the smaller company go and you don't know where to start!


Start by analyzing the systems in the diagram. Look at their descriptions and complete the questions in the Submission tab.






1) Project Title *( Give your project a descriptive title)






2)Explain 5 areas which could be considered risks. Keep in mind these are not all technical risks.









3)How would you change each area of risk? Explain your answers.


Here is how the process works. Once you make the payment, the tutor starts the work. He submits the final answer and then, it goes through a quality check process to ensure that the answer is perfect. Then, it goes through the Turnitin >> and after that it is uploaded in your account. You’ll get an email notification once the answer is uploaded to your account.08.18 PM







4)In a paragraph, offer suggestions as to how the organization could be more secure based on what you have learned throughout the course.

Answered Same DayFeb 01, 2021

Answer To: Given the diagram, how you would protect these systems? This project will help you understand how to...

Neha answered on Feb 01 2021
159 Votes
Title
The aim is to find out the different types of risk which can be faced by the organization and
how we can handle those risk.
Risks
The attack surface can be defined as different types of attacks which can be performed over the application. It can be sum of all the parts which are used for the commands to use as input and output for the application and the code which can protect these data. In the given diagram it shows that there can be risk of the data which is shared among the devices. All the devices are already in use and they may have some data in it. The devices were also used, and they may have some virus, or the malicious file installed in it which can further attack the whole organization on the processes. The attack surface is generally used as the code which can protect the data with the help of encryption and checksums. The following are...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here