Project: Problem Identification Assignment

apply a technology solution to a business problem in a specific company or organization that adds value to the organization.
January 27, 2023
tool and commands
January 27, 2023

Project: Problem Identification Assignment

Project: Problem Identification AssignmentOverviewThe objective of the final comprehensive project is to show you are competent in the Information Assurance discipline and prepared for the final capstone systems analysis and design course. You will show competence through the execution of a final information security plan. The objective of the plan is to identify a current and relevant security related problem in computing, study related literature that pertains directly to the problem, analyze an appropriate secure fault tolerant solution, design the secure fault tolerant solution, and develop a continuity and disaster recovery plan for the final solution. The identified problem must be contained in a software, network, or system environment that you have sufficient knowledge of and data access to be able to perform a thorough analysis and design.InstructionsCurrent and proper current APA formatting is required and must include a title page, proper margins, citations, organization, proper grammar and spelling, and an ending resources page.At the minimum, this phase of the project must include:I. Executive summary, introduction, and conclusiona. Executive summaryb. Introductioni. Statement of the problemii. Documentation of the organizational requirementsiii. Purpose of the planiv. Scope of the planv. Rationale of the planc. ConclusionII. Review of Related Literaturea.Scholarly, peer-reviewed, original research (8 minimum sourcesand at least 8 double-spaced, current APA-formatted pages)b. Comprehensive investigation of past and current security solutions relevant to the problemc. Summary of the research outcomesd. NOTE: required minimum length in the grading rubric excludes all systems analysis and design (SAD) diagrams and any other tables and/or graphical elementsIII. Risk Analysisa. Analyze the risk of various plausible solutions in the review of related literatureb. Value of the assetsc. Potential loss per threatd. Threat analysise. Overall annual loss per threatf. Reduce, transfer, avoid, or accept the riskIV.Environmental Diagrams (minimum of 2 required)could include, but are not limited to:a. System and/or network architecture diagramsi. If you are designing a secure network or system, at least 1 complete architectural diagram must exist that details all the connections, nodes, and/or pertinent pieces of equipment (e.g. data links, servers, switches, routers, firewalls, IDSs, SANs, databases, etc.)ii. If you are designing a secure application, detailed UML class and/or component diagrams must existb. Security and business requirement mappingsc. Information or data flow diagramsd. SDL Threat Modeling diagramse. Risk matrixf. Process overview (e.g. see ISO 31000:2009 Process Overview Diagram)g. Shared resource matrixh. Attack and/or malicious mappings (e.g. distributed denial-of-service attack mapping, encrypted message flow)Critical to your success is a comprehensive and proper understanding of the information system and surrounding environment for which the plan will address. Within the scope of the plan, you must notate each domain that will be addressed. It is important to clearly define what is inside the scope and what is outside of the scope of the plan.For example, if you choose application security, you must narrowly define the application and its counterparts within the scope. This could include mobile code, object-oriented code, database, distributed system, neural network, and a number of other components. Subsequently, the research in the review of related literature must focus on the specific types of solutions that will be necessary to be analyzed and designed. If the specific domain is software development security, and the solution must secure malicious code, the review of related literature, risk analysis, and diagrams must have some focus on varying types of malicious code such as logic bombs, Trojan horses, viruses, time bombs, trapdoors, worms, and rabbits. If the domain is network security, a number of network architecture diagrams must be present that identify every possible device within the selected business environment.Choose each element wisely; assuring that sufficient selection occurs to develop the solution based upon the research in the review of related literature. Additionally, the comprised components must provide sufficient depth to allow the minimum length requirements to be met for each phase of the project, but more importantly to securely design the system and/or application. Within EACH of the 2 diagrams, there is a minimum of 20 elements exist that accurately detail analysis of the environment that needs securing. The details will be supported by previous designs in the review of literature. These serve as a benchmark for your designs. If your literature review is insufficient, you will be assessed on relevant literature review, given your choice of design. In other words, be very detailed. If your diagrams are not detailed, they will be unable to achieve the purpose of a secure design and ultimately, fail the customer.

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.