CIS 502 MENTOR Future Starts Here/cis502mentor.com CIS 502 MENTOR Future Starts Here/cis502mentor.com | Page 43

1. Describe the company network, interconnection, and communication environment.
2. Assess risk based on the Global Finance, Inc. Network Diagram scenario. Note: Your risk assessment should cover all the necessary details for your client, GFI Inc., to understand the risk factors of the organization and risk posture of the current environment. The company management will decide what to mitigate based on your risk assessment. Your risk assessment must be comprehensive for the organization to make data-driven decisions.
a. Describe and defend your assumptions as there is no further information from this company. The company does not wish to release any security-related information per company policy.
b. Assess security vulnerabilities, including the possibility of faulty network design, and recommend mitigation procedures for each vulnerability.
c. Justify your cryptography recommendations based on datadriven decision making and objective opinions.
3. Examine whether your risk assessment methodology is quantitative, qualitative, hybrid, or a combination of these.
4. Use at least three( 3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

1. Describe the company network, interconnection, and communication environment.

2. Assess risk based on the Global Finance, Inc. Network Diagram scenario. Note: Your risk assessment should cover all the necessary details for your client, GFI Inc., to understand the risk factors of the organization and risk posture of the current environment. The company management will decide what to mitigate based on your risk assessment. Your risk assessment must be comprehensive for the organization to make data-driven decisions.

a. Describe and defend your assumptions as there is no further information from this company. The company does not wish to release any security-related information per company policy.

b. Assess security vulnerabilities, including the possibility of faulty network design, and recommend mitigation procedures for each vulnerability.

c. Justify your cryptography recommendations based on datadriven decision making and objective opinions.

3. Examine whether your risk assessment methodology is quantitative, qualitative, hybrid, or a combination of these.

4. Use at least three( 3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.