Prepare a fallback plan in the event of unexpected failures


Assignment

For this course, you will design and develop a project in three phases: (i) Problem Definition, (ii) Solution Design (iii), Solution Implementation Plan

The complete project should be a single Microsoft-compatible document, including deliverables of all three phases. Any supporting files (spreadsheets, videos, etc.) should be submitted along with the deliverables.

This project provides you with a framework for discovery and skill building. Strive to be extremely clear about the problem you are trying to solve, or the opportunity you are trying to support.

Problem Definition Phase

Research a recent threat (discovered within the last 36 months) to the security of an e-business operation. Define and describe the threat, including its discovery, history, impact on e-business operations, technical features, and risks. This deliverable is due in Week 3.
Remember that this threat must be related to e-business, which, with very few exceptions, is now a web-based operation. Focus on "what happened" and "why, or how, did it happen". Consider using the classic journalistic style of presentation: who, what, when, where why and how.

Solution Design Phase

Research the solution(s) to address the recent threat to the security of an e-business operation that you defined in the Problem Definition Phase. This is the continuation of the Problem Definition phase, so the solution design should be appended to the previous deliverable. This deliverable.

The design should "harden" the overall security of the e-business operation. Make the design proactive and forward thinking whenever possible.

Here are the key components of the Solution Design deliverable.

1. Define and design appropriate policies, procedures, products, and services that will effectively mitigate the risk of the e-business threat.

2. Suggest what the e-business should do after the design is implemented.

3. Provide cost and impact estimates where available. If the implementation requires additional hardware, indicate the vendor, model, and unit cost of the recommended component. This will be the starting point to define the financial impact of the implementation.

4. Summarize the key aspects of the design for the management team.

Implementation Plan Phase

Describe how to make your solution design a reality within the e-business. Addressed to middle and senior management, the implementation plan builds upon the prior two phases and should be appended to the previous deliverable.

The plan is a road map to improved e-business security. It typically describes "what happens", "when it happens", "who makes it happen", and the proof that the design works. A successful completion of the Implementation Plan should suggest that the e-business has now transitioned to a better security posture.

Here are the key components of the Implementation Plan deliverable.

1. Explain events to be scheduled (e.g., equipment shutdown, configuration changes, etc.)

2. Describe operational impact on the existing procedures and infrastructures

3. Prepare a fallback plan in the event of unexpected failures (restoring databases, configuration, network connectivity, etc.)

4. Describe how the implemented solution will be validated before returning to normal operation

Course Project Expectations

Here is the list of the required content for the course project.

1. Cover page

2. Table of contents - the three phases and their sections

3. Executive summary - one page, or less.

4. Problem overview

5. Description of the threat including how the threat was identified, the technical features that characterize the threat, how it works, vulnerabilities it exploits, and so forth.

6. Diagram depicting the mechanism of attack and exploitation.

7. Potential or actual consequences including damage to hardware, software, data, personnel, financial losses, etc. You should identify the nature of the security compromise (i.e., data confidentiality, integrity, availability).

8. Risk assessment based on the concepts presented in the lessons, textbook, and public sources.

9. Solution design overview

10. Solution design details (how to address the risk and prevent it from happening again)

11. Solution design implications (what else does the solution do)

12. Cost estimates where possible.

13. Implementation overview

14. Implementation schedule (required resources and new/updated policies).

15. Methods used to prove the design addressed the requirements.

16. Post-implementation expectations, benefits, and follow-up activities.

17. References

Format your assignment according to the give formatting requirements:

1. The answer must be double spaced, typed, using Times New Roman font (size 12), with one-inch margins on all sides.

2. The response also includes a cover page containing the title of the assignment, the course title, the student's name, and the date. The cover page is not included in the required page length.

3. Also include a reference page. The references and Citations should follow APA format. The reference page is not included in the required page length.

Solution Preview :

Prepared by a verified Expert
Other Subject: Prepare a fallback plan in the event of unexpected failures
Reference No:- TGS03153022

Now Priced at $40 (50% Discount)

Recommended (90%)

Rated (4.3/5)