Submitted by: Submitted by mtowner
Views: 658
Words: 280
Pages: 2
Category: Science and Technology
Date Submitted: 08/31/2012 04:18 PM
SE571 Course Project: Security Assessment and Recommendations
Mazalene Towner
Submitted to: Professor Equence Mcarthur
SE571 Principles of Information Security and Privacy
Keller Graduate School of Management
Submitted: August 8, 2012
Table of Contents
Company Overview 1
Security Vulnerabilities 2
A Hardware Weakness 2
A Policy Weakness 2
References 3
Company Overview
Here you should identify which of the two company scenarios you are using and briefly summarize the organizations products or services, and business processes
Hardware Weakness
1. Vulnerability
2. Threat
3. Risk
4. Control
Policy Weakness
1. Policy Vulnerability
2. Policy Threat
3. Policy Risk
4. Policy Control
References
[Please be sure to study and comply with the format for the required in-text and reference APA-style citations]
Bigna, S., Vernon, R. F., & Smith, M. L. (2001). Plagiarism and the web, Journal of Social Work Education. 37 (1), 193-196.
Cheverie, J.F. (2002). The changing economics of information, technological development, and copyright protection: what are the consequences for the public domain? The Journal of Academic Librarianship, 28 (5), 325-331.
Epstein, R. A. (2002). The dubious constitutionality of the copyright term extension act. Loyola of Los Angeles Law Review, 36 (1), 123-158.
Samuels, E. (2002). The public domain revisited. Loyola of Los Angeles Law Review, 36 (1), 389-436. |
U.S. Copyright Office. (1998). Summary of the digital millennium copyright act of 1998. Retrieved on August 16, 2003 from http://www.loc.gov/copyright/legislation/dmca.pdf
U.S. Patent and Trademark Office (1998) Final report to the commissioner on the conclusion of the conference on fair use. Retrieved from August 16, 2003 from http://www.uspto.gov/web/offices/dcom/olia/confu/confurep.pdf