CIS 502 MENTOR Education is Power/cis502mentor.com CIS 502 MENTOR Education is Power/cis502mentor.co | Page 60
normal. GFI estimated the loss from these network attacks at more than $ 100,000 including lost customer confidence.
Write a twelve to fifteen( 12-15) page formal risk assessment proposal and redraw the above diagram of a secure and riskmitigating model in which you:
1. Describe the company network, interconnection, and communication environment.
2. Assess risk based on the Global Finance, Inc. Network Diagram scenario. Note: Your risk assessment should cover all the necessary details for your client, GFI Inc., to understand the risk factors of the organization and risk posture of the current environment. The company management will decide what to mitigate based on your risk assessment. Your risk assessment must be comprehensive for the organization to make data-driven decisions.
a. Describe and defend your assumptions as there is no further information from this company. The company does not wish to release any security-related information per company policy.
b. Assess security vulnerabilities, including the possibility of faulty network design, and recommend mitigation procedures for each vulnerability.
c. Justify your cryptography recommendations based on datadriven decision making and objective opinions.
normal. GFI estimated the loss from these network attacks at more than $ 100,000 including lost customer confidence.
Write a twelve to fifteen( 12-15) page formal risk assessment proposal and redraw the above diagram of a secure and riskmitigating model in which you:
1. Describe the company network, interconnection, and communication environment.
2. Assess risk based on the Global Finance, Inc. Network Diagram scenario. Note: Your risk assessment should cover all the necessary details for your client, GFI Inc., to understand the risk factors of the organization and risk posture of the current environment. The company management will decide what to mitigate based on your risk assessment. Your risk assessment must be comprehensive for the organization to make data-driven decisions.
a. Describe and defend your assumptions as there is no further information from this company. The company does not wish to release any security-related information per company policy.
b. Assess security vulnerabilities, including the possibility of faulty network design, and recommend mitigation procedures for each vulnerability.
c. Justify your cryptography recommendations based on datadriven decision making and objective opinions.