Follow the instrustions

Project description
I REALLY NEED THIS DONE BY FRIDAY MIDNIGHT.. OR SATURDAY MIDNIGHT

HI, THIS IS A GROUP PROJECT.

FOR STEP 4. JUST INCLUDE THE END REPORT TO INCLUDE A SUMMARY OF THE DELIVERABLES 1-3.

I CAN WRITE UP THE POWERPOINT…

WHAT I NEED DONE FROM YOU GUYS, IS THE AUTHORIZATION CONTROLS PART. THAT IS THE ASSIGN AREA THAT I WAS GIVEN.

SO TAKE THE AUTHORIZATION CONTROLS PART AND GO WITH IT. SO THE HIGHLIGHTED PARTS IN THE DOCUMENT ARE THE MAIN PARTS OF WHERE TO FOCUS ON. STEPS 3 -5 BUILD UP 6. AND THEN THE SUMMARY PART(AKA THE PRESENTATION) WILL BE ON THE MAIN STEP 4.

I HAVE ATTACHED ANOTHER DOCUMENT TO MAYBE HELP CLEAR THINGS UP. ALSO PLEASE FOCUS USING THE NIST FOR THIS PAPER AND RISK ASSESSMENT. IF YOU HAVE QUESTIONS JUST EMAIL ME THANKS. I HIGHLIGHED PARTS IN BOTH DOCs TO HELP FOCUS ON THE AREAS.

https://owl.english.purdue.edu/owl/section/2/10/

please use this OWL
———-
Added on 15.04.2016 07:06
HI, THIS IS A GROUP PROJECT.

FOR STEP 4. JUST INCLUDE THE END REPORT TO INCLUDE A SUMMARY OF THE DELIVERABLES 1-3.

I CAN WRITE UP THE POWERPOINT…

WHAT I NEED DONE FROM YOU GUYS, IS THE AUTHORIZATION CONTROLS PART. THAT IS THE ASSIGN AREA THAT I WAS GIVEN.

SO TAKE THE AUTHORIZATION CONTROLS PART AND GO WITH IT. SO THE HIGHLIGHTED PARTS IN THE DOCUMENT ARE THE MAIN PARTS OF WHERE TO FOCUS ON. STEPS 3 -5 BUILD UP 6. AND THEN THE SUMMARY PART(AKA THE PRESENTATION) WILL BE ON THE MAIN STEP 4.

I HAVE ATTACHED ANOTHER DOCUMENT TO MAYBE HELP CLEAR THINGS UP. ALSO PLEASE FOCUS USING THE NIST FOR THIS PAPER AND RISK ASSESSMENT. IF YOU HAVE QUESTIONS JUST EMAIL ME THANKS. I HIGHLIGHED PARTS IN BOTH DOCs TO HELP FOCUS ON THE AREAS.

https://owl.english.purdue.edu/owl/section/2/10/

please use this OWL
———-
Added on 15.04.2016 07:24
Introduction
Summary of the Current Security Situation at BRI
Risk Assessment Methodology Full Guide:
1. http://csrc.nist.gov/publications/nistpubs/800-30-rev1/sp800_30_r1.pdf
2. http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf (pg. 9)
-Risk Assessment Plan
oSystem Security
oEnd User Security
oPhysical Security
oData Security Authorization Controls
oAuthorization Control
oIdentification And Authentication Controls
-Risk Assessment Findings
oSystem Security
oEnd User Security
oPhysical Security
oData Security Authorization Controls
oAuthorization Control
oIdentification And Authentication Controls
-Security Recommendation Report
oSystem Security
oEnd User Security
oPhysical Security
oData Security Authorization Controls
oAuthorization Control
oIdentification And Authentication Controls
Conclusion
Also the PowerPoint Structure + Capture
One Team Member Submission:
Title Protocol Teamname_g-2_AssignmentName_Date (Zip file)

Individual submission:
Contributions to the team effort (Word Document) Lastname_firstinitial_g-2_contribution_date
Completed Peer Evaluation Form Lastname_firstinitial_g-2_peerevaluation_date

The questions that we have are the initial assessment plan.
The answers are assessment findings.
The security recommendations are how we would fix the findings.

Guidelines:
Each one of our sections should be a minimum of 3000 words for the Interim Plans.
-We can come up with the group Interim Assessment Methodology together, we can tackle that last, but for reference we will be adhering to the NIST 800-30 2012 risk assessment plan.
-Each member for their section will have to:
oConduct a summary of their sections status before they conduct a plan, or offer recommendation we can edit each submission to account for the Summary of the Current Security Situation at BRI requirement for our paper
oRisk Assessment Findings What did you find? Have it as a separate section, but it could very well overlap with some of the information from your summary (above bullet point).
oRisk Assessment Plan How would you go about addressing each of these issues? Not what do you recommend, but rather, you now have a finding how are you assessing the level of danger/threat?
oSecurity Recommendations Report What strategies will resolve these vulnerabilities.
oSummary does not have to be long, all summaries submitted will be edited together to provide flow.
oYou will need to cite at least 7-10 sources for a good grade.
oRemember that he is not looking for too many quotes, paraphrase as much as you can!

Are you looking for a similar paper or any other quality academic essay? Then look no further. Our research paper writing service is what you require. Our team of experienced writers is on standby to deliver to you an original paper as per your specified instructions with zero plagiarism guaranteed. This is the perfect way you can prepare your own unique academic paper and score the grades you deserve.

Use the order calculator below and get started! Contact our live support team for any assistance or inquiry.

[order_calculator]