Company threat and vulnerability analysis

Company threat and vulnerability analysis
Download Document
Showing pages : 1 of 1
This preview has blurred sections. Sign up to view the full version! View Full Document
Need 3-5 pages for #1 and #2 - The citations and reference list in a paper should be formatted in accordance with APA 6th edition guidelines . 1 Company threat and vulnerability analysis - Analyze and report on the threats and vulnerabilities of the enterprise network for the Jacket-X Corporation. a. Internal Vulnerabilities i. Business Process 1. Strong Security vs. productivity 2. HR Payroll Process a. Employee individual time card entry b. Independent contractor payroll entries c. In-house payroll validation d. Payroll generation e. Paycheck generation f. Direct deposit g. Management reports h. Federal and state government reports Special notes for 1: Data pertaining to this section can be found in Case Study #1. For this section, I think we’re going to need to define the issue and describe what the business impact is. Citations should be easy to come by for describing the impact of failed security in each of these
Background image of page 1
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: areas 2 Company Security Measures - Identifies security measures which address these threats and vulnerabilities. a. Internal Vulnerabilities i. Business Process 1. Strong Security vs. productivity 2. HR Payroll Process a. Employee individual time card entry b. Independent contractor payroll entries c. In-house payroll validation d. Payroll generation e. Paycheck generation f. Direct deposit g. Management reports h. Federal and state government reports Notes for 2: Data pertaining to this section can be found in Case Study #1. For this section, I think well need to identify possible solutions to the issues defined in section 1 and describe the pros and cons of each. Citations should be easy to come by for possible solutions and concepts...
View Full Document