This preview has intentionally blurred parts. Sign up to view the full document

View Full Document

Unformatted Document Excerpt

Need 3-5 pages for #1 and #2 - The citations and reference list in a paper should be formatted in accordance with APA 6th edition guidelines . 1 Company threat and vulnerability analysis - Analyze and report on the threats and vulnerabilities of the enterprise network for the Jacket-X Corporation. a. Internal Vulnerabilities i. Business Process 1. Strong Security vs. productivity 2. HR Payroll Process a. Employee individual time card entry b. Independent contractor payroll entries c. In-house payroll validation d. Payroll generation e. Paycheck generation f. Direct deposit g. Management reports h. Federal and state government reports Special notes for 1: Data pertaining to this section can be found in Case Study #1. For this section, I think were going to need to define the issue and describe what the business impact is. Citations should be easy to come by for describing the impact of failed security in each of these areas 2 Company Security Measures - Identifies security measures which address these threats and vulnerabilities. a. Internal Vulnerabilities i. Business Process 1. Strong Security vs. productivity 2. HR Payroll Process a. Employee individual time card entry b. Independent contractor payroll entries c. In-house payroll validation d. Payroll generation e. Paycheck generation f. Direct deposit g. Management reports h. Federal and state government reports Notes for 2: Data pertaining to this section can be found in Case Study #1. For this section, I think well need to identify possible solutions to the issues defined in section 1 and describe the pros and cons of each. Citations should be easy to come by for possible solutions and concepts... View Full Document

End of Preview

Sign up now to access the rest of the document