Given the diagram, how you would protect these systems? This project will help you understand how to assess risk given gaps in systems. Please view the Attack Surfaces video. This video is from another course entitled, Planning, Auditing, and Maintenance, and is geared towards system management, however I have included it in this course. So, picture yourself in the eyes of the information technology department who is trying to get systems into production.
Background: You are an employee of the information technology department. Your organization just bought out a smaller competitor, and senior leadership wants you to integrate their systems with yours. There is one problem. They let everyone in the smaller company go and you don't know where to start!
Start by analyzing the systems in the diagram. Look at their descriptions and complete the questions in the Submission tab.
1) Project Title *( Give your project a descriptive title)
2)Explain 5 areas which could be considered risks. Keep in mind these are not all technical risks.
3)How would you change each area of risk? Explain your answers.
Here is how the process works. Once you make the payment, the tutor starts the work. He submits the final answer and then, it goes through a quality check process to ensure that the answer is perfect. Then, it goes through the Turnitin >> and after that it is uploaded in your account. You’ll get an email notification once the answer is uploaded to your account.08.18 PM
4)In a paragraph, offer suggestions as to how the organization could be more secure based on what you have learned throughout the course.