Marketing Planning

Respond to the following in a minimum of 175 words:

How can a companys marketing organization ensure that it is able to identify newly emerging competitors in time to plan and execute an effective marketing strategy in response to these competitors?

Implement Strong Access Control Measures

Go over the Spark Project Group doc and Spark Topology thoroughly; then write a one page summary of the following bullet points while addressing each of the needed suggestions below (#1-5)

-Restrict access to cardholder data by business need to know

1. Identify security-related threats to the organization.
2. Identify vulnerabilities within the organization’s architecture.
3. Identify threat/vulnerability pairs to determine threat actions that could pose risks to the organization.
4. Estimate the likelihood of occurrence and the potential negative impact for each threat action.
5. Justify your reasoning for each identified threat highlighting qualitative and quantitative data.

-Identify and authenticate access to system components

1. Identify security-related threats to the organization.
2. Identify vulnerabilities within the organization’s architecture.
3. Identify threat/vulnerability pairs to determine threat actions that could pose risks to the organization.
4. Estimate the likelihood of occurrence and the potential negative impact for each threat action.
5. Justify your reasoning for each identified threat highlighting qualitative and quantitative data.

-Restrict physical access to cardholder data

1. Identify security-related threats to the organization.
2. Identify vulnerabilities within the organization’s architecture.
3. Identify threat/vulnerability pairs to determine threat actions that could pose risks to the organization.
4. Estimate the likelihood of occurrence and the potential negative impact for each threat action.
5. Justify your reasoning for each identified threat highlighting qualitative and quantitative data.

***Use the PCI_DSS PDF for reference to construct summary***

ABC

 ABC Learning Center is a child care center the uses a local area network to run its business. Employees use a computer in the main room to check children in and out and complete of other necessary paperwork for the center. Records and financial information are kept on another computer located in a back room restricted to employees only. A Web server is also hosted in the back room; a router provides access to the Internet via a broadband DSL connection. The center does not use antivirus software, as the Internet access was primarily implemented to broadcast images from a webcam in the main room so that parents can check on the children via the Internet. Since you are enrolled in a Security Assessment and Auditing class at Tarrant County College, you have been recommended to assist ABC Company with a risk assessment. Complete the following questions based on information provided, (over). 1. What are possible risks to this business? 2. Research solutions you would recommend for this business. Explain. 3. Create an attack tree showing threats that may impact the ABC Learning Center. Please use the correct symbols. 

EEP Writing Assignment

APA Format

4-6 Pages

Minimum of 5 Scholarly articles with links to journal

Must run through turnitin or plagiarism checker with report

Use the thesis statement and the three aspects from the annotation bibliography assignment