Hardware and Policy Weakness at Aircraft Solutions

Submitted by: Submitted by

Views: 658

Words: 280

Pages: 2

Category: Science and Technology

Date Submitted: 08/31/2012 04:18 PM

Report This Essay

SE571 Course Project: Security Assessment and Recommendations

Mazalene Towner

Submitted to: Professor Equence Mcarthur

SE571 Principles of Information Security and Privacy

Keller Graduate School of Management

Submitted: August 8, 2012

Table of Contents

Company Overview 1

Security Vulnerabilities 2

A Hardware Weakness 2

A Policy Weakness 2

References 3

Company Overview

Here you should identify which of the two company scenarios you are using and briefly summarize the organizations products or services, and business processes

Hardware Weakness

1. Vulnerability

2. Threat

3. Risk

4. Control

Policy Weakness

1. Policy Vulnerability

2. Policy Threat

3. Policy Risk

4. Policy Control

References

[Please be sure to study and comply with the format for the required in-text and reference APA-style citations]

Bigna, S., Vernon, R. F., & Smith, M. L. (2001). Plagiarism and the web, Journal of Social Work Education. 37 (1), 193-196.

Cheverie, J.F. (2002). The changing economics of information, technological development, and copyright protection: what are the consequences for the public domain? The Journal of Academic Librarianship, 28 (5), 325-331.

Epstein, R. A. (2002). The dubious constitutionality of the copyright term extension act. Loyola of Los Angeles Law Review, 36 (1), 123-158.

Samuels, E. (2002). The public domain revisited. Loyola of Los Angeles Law Review, 36 (1), 389-436. |

U.S. Copyright Office. (1998). Summary of the digital millennium copyright act of 1998. Retrieved on August 16, 2003 from http://www.loc.gov/copyright/legislation/dmca.pdf

U.S. Patent and Trademark Office (1998) Final report to the commissioner on the conclusion of the conference on fair use. Retrieved from August 16, 2003 from http://www.uspto.gov/web/offices/dcom/olia/confu/confurep.pdf