Implementation and enforcement of security policies.

 

Implement vulnerability and risk assessment techniques to justify implementation and enforcement of security policies.

Part 1:

For this assignment you will need to install the Belarc Advisor by going to the Belarc website and following the instructions provided in the “Belarc Installation, Saving, and Uploading Instructions” resource. Instructions for saving and uploading the assignment files are also included in this document. In step 10 you will complete a local system scan of your computer.

Note: If your computer utilizes an operating system other than Windows 7, Vista, or XP Pro, you will need to use the “Summary” file to complete the topic assignment rather than the local system scan outlined in step 10 of the “Belarc Installation, Saving, and Uploading Instructions.”

Use the results of the local system scan to compose a 300-word paper that discusses each section’s role in securing or protecting the scanned system. Expand each section to identify how the system passed or failed the various policies. For each section, address the following:

Identify the section and explain why the system passed or failed.
Explain the risks identified from the results.
Discuss how a threat could exploit the risks and impact the system.
Explain how the failed policies can be solved.
Part 2:

Using the “Risk Assessment Template,” list 20 risks in the “Risk” column. The risks should be failed items from the Belarc Advisor results. Complete the remaining spreadsheet columns for each identified risk. The spreadsheet must include the following:

Risk Title: Obtained from the Belarc Advisor report.
Description: Summarize the information obtained from the Belarc Advisor report hyperlink (pop-up window).
Vulnerability: Explain the vulnerability associated with this risk.
Threat: Identify potential threats that can exploit this vulnerability.
Current Safeguards: Identify if any policies or best practices are in place to reduce the likelihood the threat will be successful.
Impact: Describe the impact if threat is successful.
Severity: Measure the overall severity of the exploitation or impact.
Likelihood: Measure the likelihood a threat will be successful.
Risk Value: Measure the overall value of the risk (low = no real value is exploited; medium = dangerous if exploited; high = extremely grave if exploited).
Submit the 300-word paper, Belarc Advisor results (.xps or .pdf), and completed “Risk Assessment Template.”

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are not required to submit this assignment to LopesWrite.

Benchmark Information

This benchmark assignment assesses the following programmatic competencies:

MS Information Technology Management

1.5: Evaluate system risks, threats, and vulnerabilities and practices and processes to ensure the safety and security of business information systems.

MS Information Assurance and Cybersecurity

3.2: Evaluate system risks, threats, and vulnerabilities and practices and processes to ensure the safety and security of business information systems.

 

Sample Solution

ercise of this power of punishment can not be arbitrary, but must be exercised in accordance with the rules of political and social consensus, or the rules of unanimous consent of their authorized representatives. This is the origin of legislative and administrative power, and the reason for the emergence of the government and the political society itself.

The purpose of the government is to protect private property. As long as a man separates anything from its natural state of existence, it has been mingled with his labor, that is, with all his own things, and thus it becomes his property. In other words, labor adds something to the natural things so that they become the private property of workers. Labor creates wealth, and money expands wealth. People have property rights in the natural state. The purpose of the government after its establishment is to protect private property, and it must not be infringed on. Therefore, without the consent of the people themselves or their representatives, the government should never impose taxes on the people’s property.

Rule of law and decentralization. The state must be governed by formally promulgated, long-term and effective laws, rather than by temporary arbitrary orders. Once the law is enacted, everyone must obey it equally, no matter whether rich or poor, noble or low. No one can evade the restraint and sanction of the law under any pretext. There are three kinds of state power: legislative power, executive power and foreign power. Legislative power is the supreme power of the state, but it is not, nor can it be absolutely arbitrary with regard to people’s lives and property, and can not take any part of anyone’s property without his consent. Because the same group of people have the power to formulate and enforce laws at the same time, it will tempt people’s weaknesses to seize power, so the legislative power and executive power should be separated. Although there are differences between executive power and foreign power, the two powers are almost always united.

“Non-secular morality” and “secular morality” are my terms. “Non-secular morality” can be described as the morality that does not talk about interests but only about virtue itself; “secular morality” is the morality that needs to be proved by reference to public welfare. In my analysis, Locke separated God’s “law enforcement power” by distinguishing the two kinds of morals. The “right of reward and punishment” in “God exercises the right o

This question has been answered.

Get Answer
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, Welcome to Compliant Papers.