Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

do not answer me old one. i need new answer because i m paying here. Midterm Req

ID: 3743875 • Letter: D

Question

do not answer me old one. i need new answer because i m paying here.

Midterm Requirements

Individual Paper:

Complete a risk assessment and a threat vulnerability profile for an internet and intranet web site. Complete a threat-vulnerability-asset worksheet. This is a small business firm that uses open source and Windows 7/8/10 and Windows Server 2012. Windows is used for the desktops and server. The firewall and network use PFsense as the vendor. Assume 1 windows server, 1 PFsense router and 1 PFsense firewall. And 3 desktops for the staff.

RE: Risk IT Framework for Management of IT Related Business Risk: http://www.isaca.org/Knowledge-Center/Risk-IT-IT-Risk-Management/Pages/default.aspx

IT Asset Management: http://searchcio.techtarget.com/definition/IT-asset-management-information-technology-asset-management

Microsoft: https://technet.microsoft.com/en-us/library/cc958343.aspx

Explanation / Answer

As the years are passing by, security is growing as one of the most effective fields in the history of computers. There is an need of getting each one of the things secured with the help of the internet security with ethical actions. There are many things happening in the web and promising the safety without taking any tough measures is one of the impossible task nowadays. Hence, companies and individuals have moved to the security tools and technologies to keep their information safe while connected to the internet.

Risk Assessment & Threat Vulnerability:

Nowadays, companies have moved on to the Agile or Rapid Application Development SDLC(Software Development Life Cycle) which has been resulting in reducing the development timeframe. Now, starting with the risk assessment, here we go,

Hence, this is all about the risk assessment and the vulnerability. Everyone must keep in mind that being safe on internet is an integral part of the virtual life and must carry on managing the security each time there is any interference of threats or vulnerability.