assignment- Richman provides smartphones to certain employees. Management is wil

assignment-
Richman provides smartphones to certain employees. Management is willing to buy insurance for each smartphone if it is cost-effective, and wants you to perform a quantitative risk assessment to help it make a decision.
In addition, management is concerned about the security of its customer data and would like you to perform a qualitative risk assessment that determines the risk level of the following:
Unauthorized access by an external party
Sabotage by an internal employee
Hardware failures
You will be provided a worksheet that details the assignment. Good luck!
Considerations-
The following is a list of tasks you need to perform in this assignment, which is in two parts:
Quantitative Risk Assessment of Buying Insurance for Smartphones
Calculate the values for the SLE, ARO, and ALE.
Determine the effectiveness of the safeguard that insurance provides.
Determine whether or not Richman should buy the insurance. Justify your answer.
Qualitative Risk Assessment of the Security of Customer Data
Calculate the risk level of each of the risks given in the scenario in the worksheet. (attached)
Prioritize the given risks.
Create an effective risk matrix for the given scenario.

The post assignment-
Richman provides smartphones to certain employees. Management is wil
appeared first on homework handlers.

Assignment- Senior management has asked us to tighten the security of our compan

Assignment-
Senior management has asked us to tighten the security of our company infrastructure and network. In this respect, we need to design some new security strategies. I would like you to design an enterprise encryption strategy—a PKI that supports internal employees, external business partners, and clients of Richman. As you design the strategy, remember the following:
Select appropriate encryption algorithms and methods.
Identify and justify the selection of encryption solutions that support internal employees, external business partners, and clients.
Keep the following in mind as you attempt this assignment:
An encryption strategy must be carefully planned before implementation.
To solve a business security problem, you need to understand the functions and terms of cryptography.
Various encryption tools are available, such as PKI and crypto accelerators.
Review the general classifications of security products and services.
handout it attached if it helps

The post Assignment-
Senior management has asked us to tighten the security of our compan
appeared first on homework handlers.

Senior management has asked us to provide a comprehensive acceptable use (AUP) p

Senior management has asked us to provide a comprehensive acceptable use (AUP) policy.
Building on the Internet and email use policy you created for Richman Investments previously, define a LAN-to-WAN, Internet, and web surfing AUP that restricts usage of the company’s Internet connection and permits the company to monitor usage of the corporate Internet connection.
Keep in mind that Richman requires the enforcement of strict ingress-egress filtering policies for network traffic.Certain traffic is expressly forbidden.
While creating the policy, carefully evaluate the implications of the policy and how implementations might impact the IT infrastructure, both positively and negatively. Weigh the benefits and the disadvantages of each method. Consider whether or not a proposed solution causes an interruption to legitimate users and how it might enhance security at the expense of preventing a perfectly legitimate activity.
factors-
Richman Investments requires the enforcement of strict ingress-egress filtering policies for network traffic. Certain traffic is expressly forbidden:
No peer-to-peer file sharing or externally reachable File Transfer Protocol (FTP) servers
No downloading executables from known software sites
No unauthorized redistribution of licensed or copyrighted material
No exporting internal software or technical material in violation of export control laws
No introduction of malicious programs into networks or onto systems
No accessing unauthorized internal resources or information from external sources
No port scanning or data interception on the network
No denying service or circumventing authentication to legitimate users
No using programs, scripts, or commands to interfere with other network users
No sending unsolicited email messages or junk mail to company recipients
No accessing adult content from company resources
No remote connections from systems failing to meet minimum security requirements
Tasks-
Define an effective LAN-to-WAN, Internet, and web surfing AUP. Evaluate the implications of the policy.Carefully consider the benefits and disadvantages of each policy enforcement control.Propose strong ideas for acceptable and unacceptable resource usage. Write a comprehensive AUP

The post Senior management has asked us to provide a comprehensive acceptable use (AUP) p appeared first on homework handlers.

create a report on a malicious code attack that occurred within the last year. Y

create a report on a malicious code attack that occurred within the last year. You can select a well-known virus or malicious code attack and write a summary report explaining what kind of malicious attack it was, how it spread and attacked other devices, and how it was mitigated. In the report, you should also explain how you would prevent the attack from recurring on a network that you control. You may use the Internet for research.
As you gather information for the summary report, consider the following:
The severity of the outbreak
The propagation methods and speed
The targets of the attack
The success rate of the attack vector
Additional complexity: for example, self-armoring and self-updating
The ways to prevent against infection in every IT infrastructure domain
The ways to prevent intrusion at every layer
The following are a few concepts that you should brush up on as you attempt this assignment:
Consider attack vectors and propagation methods. What makes some methods more aggressive to defend against?
How are advancements in malware design creating complex challenges for security?

The post create a report on a malicious code attack that occurred within the last year. Y appeared first on homework handlers.