Risk management requirement.

This is a 3 part project, This is part 1 Analysis and Planning (Additional Information in attachments)

In this section, students will address each of the following:

Analysis and Planning

In this section, students will address each of the following:

  • Define the vulnerability assessment requirement, propose a solution, and justify the solution.
    • Students should review the text and example provided but do not include it with their submission. Delete the text and include you own.
  • Define the security policy requirement, propose a solution, and justify the solution.
    • Students should be specific when defining the overall security outlook for the organization.
  • Define the risk management requirement, propose a solution, and justify the solution.
    • Students should describe the process, its value to the organization, and use proper terminology.
  • Define the business continuity plan requirements, propose a solution, and justify the solution.
    • Student should describe the activity in detail, and include each of the plan types.
  • Define the access controls requirement, propose a solution, and justify the solution.
    • Students should be specific with the type of access control model they select.

Answer preview

The proposed solution that will be used to manage the network is to conduct a thorough vulnerability assessment using vulnerability scanners.  The database of the seller determines the effectiveness of a vulnerability assessment tool.  The seller’s database must be updated on a frequent basis to ensure that it has the most recent information about the threats that the network faces.  The database must also have the ability to check network asset inventory which it can do by getting details from the active directory. The information will then be used to identify all the devices that are active on the network and conduct a baseline scan on the system. The baseline scan will also help in identifying the applications that are running in the machine.  At the same time, the tool will check its database for any vulnerability that could affect the network.

[1505 Words]

Scroll to Top