You must have a vulnerabilities section in which you


Question: You need to write the proposal as detailed in the instructions below. Be sure that you create a professional, well-developed proposal with proper documentation, grammar, spelling, and punctuation. In addition, document the vulnerabilities, methods, and controls effectively. Specific Content

Requirements: 1. Your paper must begin with an Introduction section. In this section, you must clearly state which of the seven scenarios above that you will be reporting on, and which of the SSCP® domains you will be relating it to (there may be more than one SSCP® domain, but, as a minimum, there will be one).

2. You must specifically state the problem in your Introduction section.

3. You must have a Vulnerabilities section in which you thoroughly describe the possible vulnerabilities faced by Richman due to the situation in the scenario.

4. You must have a Methods section, in which you describe the methods you will use to mitigate the vulnerabilities you have described.

5. You must have a Controls section, in which you will describe, in accordance with the definitions of controls in the text, the types of controls you will use, based on the methods above.

6. You must have the sections listed above, but if you feel that you need to include any other sections between the Introduction and Conclusion, you may include those as well.

7. You must have a Conclusions section, in which you will make your recommendations to Richman.

8. You must have a References section.

• You must have a minimum of four references

• Only one may be the textbook - list all of the pertinent pages

• Only one may be the SSCP® guide.

• So a minimum of two others must be from other sources.

9. You must have an Appendix describes Richman's BYOD policy for employee (non-manager) use of smartphones in the workplace. This policy will use the ISSP format provided to you from Whitman-Mattord's Principles of Information Security, 4th ed.

Solution Preview :

Prepared by a verified Expert
Basic Computer Science: You must have a vulnerabilities section in which you
Reference No:- TGS02503453

Now Priced at $15 (50% Discount)

Recommended (91%)

Rated (4.3/5)