Your midterm project was to provide a security assessment for [X], an online software company that specializes in selling ad spaces in their parent company’s magazine. [X] manages an online database that allows their customers to upload and pay for their business ads for magazine placement. Because [X] ‘s database needs to connect to the parent company’s database, the parent company has requested that [X] system be assessed and verified as secure.
Now that you have provided your security assessment, the next step is to provide [X] with your Security Portfolio. Using this week’s Reading on the NIST framework that includes the 5-step process for creating a balanced portfolio of security products, your assignment will be to create a Security Portfolio with the following sections:
(Note: [X] can be any company and any line of business)
1. Cover Page (i.e. APA title page)
2. Background (provide a synopsis of your midterm security assessment on Vestige)
3. For each security need identified (or needs to be identified) from your Midterm Assignment, Find the products that will deliver the needed capabilities for the right price and tell why you chose that product.
This assignment should be about security needs only. Do NOT discuss how the client can achieve more business (That is not your job).
Answer the questions with an APA-formatted paper (Title page, body, and references only). Your response should have a minimum of 600 words. Count the words only in the body of your response, not the references. A table of contents and abstracts are not required.
A minimum of two references is required. One reference for the book is acceptable but multiple references are allowed. There should be multiple citations within the body of the paper. Note that an in-text citation includes the author’s name, year of publication, and the page number where the paraphrased material is located.
Your paper must be submitted to SafeAssign. The resulting score should not exceed 35%.
NOTE: Please find related content in Chapter 12 from textbook Securing Systems: Applied Security Architecture and Threat Models.
NOTE: I have attached the Mid Term project for reference.
Select your paper details and see how much our professional writing services will cost.
Our custom human-written papers from top essay writers are always free from plagiarism.
Your data and payment info stay secured every time you get our help from an essay writer.
Your money is safe with us. If your plans change, you can get it sent back to your card.
We offer more than just hand-crafted papers customized for you. Here are more of our greatest perks.
Get instant answers to the questions that students ask most often.
See full FAQ