Vulnerabilities project

Course Project https://devry.equella.ecollege.com/file/533904c1-e208-48bd-af85-287c77dbff66/1/SEC571_CH_CourseProject.html[11/3/2014 7:06:01 PM] Course Project: Security Assessment and Recommendations Overview | Guidelines | Grading Rubrics | Best Practices This course does involve a lot of technical information and theory, but what really matters is how this knowledge can be used to identify and remediate real-world security issues. What you learn in this course should be directly applicable to your work environment. The course project that you will complete is designed to further this goal. In the first part of the project, you will choose an organization from one of two given scenarios (below) and identify potential security weaknesses, and in the second part of the project, you will recommend solutions. The first part of the project is due in Week 3, and the second part of the project, along with the first part (presumably revised based on instructor feedback) is due in Week 7. This project constitutes a significant portion of your overall grade. This is an individual assignment and may not be completed in teams. Phase I – Identify potential weaknesses from either the Aircraft Solutions or Quality Web Design Company Print Overview Back to Top Guidelines Back to Top In this phase, you will choose either Aircraft Solutions or Quality Web Design as the company you will work with. The scenarios are in Doc Sharing in the Course Project select area. You will then identify potential security weaknesses. Security weaknesses – You must choose two from the following three areas (hardware, software, and policy – excluding password policies) and identify an item that requires improved security. To define the asset or policy with sufficient detail to justify your assessment, your assessment must include: the vulnerability associated with the asset or policy the possible threats against the asset or policy the likelihood that the threat will occur (risk) the consequences to…