environment. The company management will decide what to mitigate based on your risk assessment. Your risk assessment must be comprehensive for the organization to make data-driven decisions.
a. Describe and defend your assumptions as there is no further information from this company. The company does not wish to release any security-related information per company policy.
b. Assess security vulnerabilities, including the possibility of faulty network design, and recommend mitigation procedures for each vulnerability.
c. Justify your cryptography recommendations based on datadriven decision making and objective opinions.
3. Examine whether your risk assessment methodology is quantitative, qualitative, hybrid, or a combination of these.
4. Use at least three( 3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
5. Create the redrawn diagram of a secure and risk-mitigating model using Microsoft Visio or its open source equivalent. Note: The graphically depicted solution is not included in the required page length.
Your assignment must follow these formatting requirements:
environment. The company management will decide what to mitigate based on your risk assessment. Your risk assessment must be comprehensive for the organization to make data-driven decisions.
a. Describe and defend your assumptions as there is no further information from this company. The company does not wish to release any security-related information per company policy.
b. Assess security vulnerabilities, including the possibility of faulty network design, and recommend mitigation procedures for each vulnerability.
c. Justify your cryptography recommendations based on datadriven decision making and objective opinions.
3. Examine whether your risk assessment methodology is quantitative, qualitative, hybrid, or a combination of these.
4. Use at least three( 3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
5. Create the redrawn diagram of a secure and risk-mitigating model using Microsoft Visio or its open source equivalent. Note: The graphically depicted solution is not included in the required page length.
Your assignment must follow these formatting requirements: