Question: PART A You are to identify a system and perform a security review. The system you select is your choice but must be approved by

PART A You are to identify a system and perform a security review. The system you select is your choice but must be approved by your instructor. Examples of acceptable systems include your workstation or an e- commerce website. Your security review should also cover the privacy and ethical temptation issues covered in your previous assessment. In your review you must: a) Conduct a risk analysis on the system, record the outcomes then assess and categorise risks b) Evaluate threats to the system and record your findings 0) Identify and document human interactions with the system, categorise and assess the risks associated with these actions [1) Determine and plan resources, controls and risk management plans for the identified categories PART B You are to design password policies and procedures for workstation logins in an organisation, including complexity and ageing. You are to research and develop: a) a security plan identifying how to implement controls to enforce these policies in Microsoft Windows or other operating system. You should also research methods to identify breakdowns and attempted circumventions of these controls and: b) document a procedure for periodically monitoring these attempts. PART 0 You are to develop and document: a) a management review process for reviewing and monitoring risks. Your review process should include reviewing your risk analysis process based on security bench marks from vendors, security specialists and organisational reviews. You must also investigate and recommend the suitable times at which your system should be analysed re-evaluated for new threats and risks
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
