SportX company is specialized on selling sports products.SportX company is specialized on selling sports products. The company's main sales are through their e-commerce website, where customers can issue orders and pay online. SportX company can receive ord… read more
Erwin Garcia
Master of Science
2,546 satisfied customers
Can you help me with case study. SportX company isSportX company is specialized on selling sports products. The company's main sales are through their e-commerce website, where customers can issue orders and pay online. SportX company can receive orders through the following lines of sales 1. Online e-commerce website 2. Phone calls 3. Email orders Then the sales team are responsible on checking those emails and orders, prepare them and the deliver them to customer. Technical Specification. 1. Currently SportX have two branches – one headquarter and one site branches 2. HQ contains the following – a. Email server b. Web Server that hosts the e-commerce site. c. Databases Server that include the following databases 1. a. i. Employee Database ii. Customer Database iii. Product Database iv. Orders Database 3. Figure 1 shows the entire topology SportX's business got an exponential growth from the beginning of 2018. This steady growth also brought challenges for SportX They have to secure the sensitive information of their employee, customer and the most important assets are the orders Database. Moreover, their employees receive many emails and they have to filter the orders emails from other emails. SportX had no dedicated security team and therefore till now no security policy is in place. Recently, the governing body of SportX forms a security team and makes following two goals that they would like to achieve in six months – 1. Assessing the current risk of the entire organization 2. Treat the Risk as much as possible In achieving the above two goals, today you will do the followings – 1. Find at least five assets 2. Find at least two threats against each asset 3. Idenitfiy vulnerabilities for the assets 4. Calculate Risk 5. Provide treatment strategy for each risk 6. Make the HQ's network secure by design 7. Finally, provide plausible protection mechanism **Please follow the answer guideline Question 1 (5 points) Saved List five most valuable assets of SportX Question 2 (10 points) Create a weighted factor analysis worksheet (WFAW). In WFAW, use at least four criteria. Question 3 (10 points) Identify and list two threats for each asset. Question 4 (10 points) Identify and list the vulnerability of each asset. (One vulnerability against each asset)Question 5 (15 points) At the end of the risk identification process, you should have i) a prioritized list of assets and ii) a prioritized list of threats facing those assets and iii) Vulnerabilities of assets. At this point, create Threats-Vulnerabilities-Assets (TVA) worksheet. Question 6 (5 points) Each TVA triplet represents risk. Choose any five triplets and identify the impact and likelihood of each risk. Question 7 (15 points) Calculate the risk rating of each of the five triplets out of 25. Consider that your assumptions and data are 95% accurateQuestion 8 (15 points) For each of the five identified risk, state what basic strategy you will take. Justify for each decision.Question 9 (15 points) Advise all possible protection mechanism and corresponding place of application. … read more
Erwin Garcia
Master of Science
2,546 satisfied customers
QUESTION 1 A(n) _________________ policy are codified asQUESTION 1A(n) _________________ policy are codified as standards and procedures that are used when configuring or maintaining systems.0.10000 points Save AnswerQUESTION 2In systems analysis and desig… read more
F. Naz
Chartered Accountant
CA Finalist & Completed B.com
2,280 satisfied customers
Question 1 of 20 0.0/ 5.0 Points You have purchased an AppleQuestion 1 of 20 0.0/ 5.0 Points You have purchased an Apple desktop computer and want to set it up so that you can access your computer desktop when you are on the road. How might you do this? A. Ins… read more
F. Naz
Chartered Accountant
CA Finalist & Completed B.com
2,280 satisfied customers
Test 3 Question 1 of 20 5.0 Points You have purchased anTest 3 Question 1 of 20 5.0 Points You have purchased an Apple desktop computer and want to set it up so that you can access your computer desktop when you are on the road. How might you do this? A. I… read more
F. Naz
Chartered Accountant
CA Finalist & Completed B.com
2,280 satisfied customers
Requesting help with a Risk assessment CISSP class. InformationRequesting help with a Risk assessment for a CISSP class. Information is below.. GLOBAL ASSET, INC. (GAI) Global Asset, Inc. (GAI) is a financial company that manages thousands of accounts across Cana… read more
Mr. Gregory White
Teacher/Appraiser
1,273 satisfied customers
Hi David, I know this is short notice but do you have timeAttachment: 2014-10-06_203030_executive+proposal.docx Hi David, I know this is short notice but do you have time to complete this by today no later than tomorrow. The purpose of this project is to eva… read more
David L.
Engineer
Bachelor's Degree
11,814 satisfied customers
You have a PC tower that you use mainly for your school workYou want to install a home network. You have a PC tower that you use mainly for your school work and hobby (editing and printing photos). Your spouse has a laptop that is used primarily for online sch… read more
Steve Herrod
Senior Customer Care Engineer
Master's Degree
619 satisfied customers
Steve Herrod DUE JULY 12,2013 1159PM 1. If an organizationSteve Herrod DUE JULY 12,2013 1159PM 1. If an organization has three information assets to evaluate for risk management purposes as shown in the accompanying data, which vulnerability should be evalua… read more
Steve Herrod
Senior Customer Care Engineer
Master's Degree
619 satisfied customers
Question 1 The introduction of new information technologyQuestion 1 The introduction of new information technology has a: A. dampening effect on the discourse of business ethics. B. ripple effect raising new ethical, social, and political issues. C. benefic… read more
Bizhelp
Certified Public Accountant (CPA)
Bachelor's Degree
2,942 satisfied customers
Consider the following outline for a security policy. BasedConsider the following outline for a security policy. Based on your readings, write a one-page opinion piece as to what elements should be added to the outline so that it applies to a home network or … read more
David L.
Engineer
Bachelor's Degree
11,814 satisfied customers
Information Security White Paper - $250 bonus by 7/10/2011Information Security White Paper Watch the Information Technology Security for Small Businesses video from the National Institutes of Standards and Technology (NIST): Source: National Institute of Sta… read more
Wiz of All
Bachelor's Degree
118 satisfied customers
6. The data stored on a computer is often the most valuable6. The data stored on a computer is often the most valuable component in the system. a. Describe FOUR main areas of risk threatening data. b. Suggest precautions against loss of data c. If data on dis… read more
Wiz of All
Bachelor's Degree
118 satisfied customers
(NNN) NNN-NNNNword essay in APA format detailing the ideas, ...(NNN) NNN-NNNNword essay in APA format detailing the ideas, strategies, and recommendations you might make to the management of the organization in the following scenario: In a service-related Health … read more
Jane T (LLC)
Master's Degree
5,402 satisfied customers
Select a large organization with which you are familiar. It ...Select a large organization with which you are familiar. It can be a company for which you currently work, a previous place of employment or a company in which you are interested. In 4-6 paragraphs, n… read more
victory123
Bachelor's Degree
64 satisfied customers
Disclaimer: Information in questions, answers, and other posts on this site ("Posts") comes from individual users, not JustAnswer; JustAnswer is not responsible for Posts. Posts are for general information, are not intended to substitute for informed professional advice (medical, legal, veterinary, financial, etc.), or to establish a professional-client relationship. The site and services are provided "as is" with no warranty or representations by JustAnswer regarding the qualifications of Experts. To see what credentials have been verified by a third-party service, please click on the "Verified" symbol in some Experts' profiles. JustAnswer is not intended or designed for EMERGENCY questions which should be directed immediately by telephone or in-person to qualified professionals.