CIS 502 MENTOR Future Starts Here/cis502mentor.com CIS 502 MENTOR Future Starts Here/cis502mentor.com | Page 43

1 . Describe the company network , interconnection , and communication environment .
2 . Assess risk based on the Global Finance , Inc . Network Diagram scenario . Note : Your risk assessment should cover all the necessary details for your client , GFI Inc ., to understand the risk factors of the organization and risk posture of the current environment . The company management will decide what to mitigate based on your risk assessment . Your risk assessment must be comprehensive for the organization to make data-driven decisions .
a . Describe and defend your assumptions as there is no further information from this company . The company does not wish to release any security-related information per company policy .
b . Assess security vulnerabilities , including the possibility of faulty network design , and recommend mitigation procedures for each vulnerability .
c . Justify your cryptography recommendations based on datadriven decision making and objective opinions .
3 . Examine whether your risk assessment methodology is quantitative , qualitative , hybrid , or a combination of these .
4 . Use at least three ( 3 ) quality resources in this assignment . Note : Wikipedia and similar Websites do not qualify as quality resources .

1 . Describe the company network , interconnection , and communication environment .

2 . Assess risk based on the Global Finance , Inc . Network Diagram scenario . Note : Your risk assessment should cover all the necessary details for your client , GFI Inc ., to understand the risk factors of the organization and risk posture of the current environment . The company management will decide what to mitigate based on your risk assessment . Your risk assessment must be comprehensive for the organization to make data-driven decisions .

a . Describe and defend your assumptions as there is no further information from this company . The company does not wish to release any security-related information per company policy .

b . Assess security vulnerabilities , including the possibility of faulty network design , and recommend mitigation procedures for each vulnerability .

c . Justify your cryptography recommendations based on datadriven decision making and objective opinions .

3 . Examine whether your risk assessment methodology is quantitative , qualitative , hybrid , or a combination of these .

4 . Use at least three ( 3 ) quality resources in this assignment . Note : Wikipedia and similar Websites do not qualify as quality resources .