CIS 502 MENTOR Extraordinary Life/cis502mentor.com CIS 502 MENTOR Extraordinary Life/cis502mentor.com | Page 44

environment . The company management will decide what to mitigate based on your risk assessment . Your risk assessment must be comprehensive for the organization to make data-driven decisions .
a . Describe and defend your assumptions as there is no further information from this company . The company does not wish to release any security-related information per company policy .
b . Assess security vulnerabilities , including the possibility of faulty network design , and recommend mitigation procedures for each vulnerability .
c . Justify your cryptography recommendations based on datadriven decision making and objective opinions .
3 . Examine whether your risk assessment methodology is quantitative , qualitative , hybrid , or a combination of these .
4 . Use at least three ( 3 ) quality resources in this assignment . Note : Wikipedia and similar Websites do not qualify as quality resources .
5 . Create the redrawn diagram of a secure and risk-mitigating model using Microsoft Visio or its open source equivalent . Note : The graphically depicted solution is not included in the required page length .
Your assignment must follow these formatting requirements :

environment . The company management will decide what to mitigate based on your risk assessment . Your risk assessment must be comprehensive for the organization to make data-driven decisions .

a . Describe and defend your assumptions as there is no further information from this company . The company does not wish to release any security-related information per company policy .

b . Assess security vulnerabilities , including the possibility of faulty network design , and recommend mitigation procedures for each vulnerability .

c . Justify your cryptography recommendations based on datadriven decision making and objective opinions .

3 . Examine whether your risk assessment methodology is quantitative , qualitative , hybrid , or a combination of these .

4 . Use at least three ( 3 ) quality resources in this assignment . Note : Wikipedia and similar Websites do not qualify as quality resources .

5 . Create the redrawn diagram of a secure and risk-mitigating model using Microsoft Visio or its open source equivalent . Note : The graphically depicted solution is not included in the required page length .

Your assignment must follow these formatting requirements :