Conduct a risk assessment and Develop security standards documentation

Budget $8 - $15 USD / hour
Bids 9
Average Bid $19

This assignment will be based on a made up scenario about a customer database development for internal website of the "Computer Repair Store" Send me a massage if you need more info. I have more assignments if you offer fair price and give me a good paper.
Instructions:
Prepare the Risk Assessment and Security Standards documentation for your project.
The risk assessment report will range from physical threats, lack of policy implementation and malicious security attacks.
Security Standards documentation include identification of organizational objectives, strategies, and policies, as well as determination of organizational security requirements. Discuss the controls and safeguards that are put in place by the organization to protect against threats, reduce vulnerabilities, risk, and support organizational objectives.
This document should follow a structured approach, and you should use the following outline. The items in BOLD should be your paragraph headings. What follows the headings should be the content of that section.
Make sure that all of the following are covered in your paper:
Risk Assessment: Document the vulnerabilities, threats and risks associated with your project.
Risk Likelihood and Impact: Rate the possibility of risk taking place and impact it would have upon organization, data integrity, public trust, and company value.
Organizational requirements: Security requirements of the organization. Topics may include administrative and physical safeguards to protect company and customer data.
Instructions:
Prepare the Risk Assessment and Security Standards documentation for your project.
The risk assessment report will range from physical threats, lack of policy implementation and malicious security attacks. For example, a fire and subsequent sprinkler system could damage servers, cabling, and the workstations. System vulnerabilities could be exposed due to not implementing remote OS authentication, providing unauthorized access to customer data. Or the lost laptop left at the airport security scanner with the passwords disabled could result in any number of circumstances for compromised data integrity.
Security Standards documentation include identification of organizational objectives, strategies, and policies, as well as determination of organizational security requirements. Discuss the controls and safeguards that are put in place by the organization to protect against threats, reduce vulnerabilities, risk, and support organizational objectives.
This document should follow a structured approach, and you should use the following outline. The items in BOLD should be your paragraph headings. What follows the headings should be the content of that section.
Make sure that all of the following are covered in your paper:
Risk Assessment: Document the vulnerabilities, threats and risks associated with your project.
Risk Likelihood and Impact: Rate the possibility of risk taking place and impact it would have upon organization, data integrity, public trust, and company value.
Organizational requirements: Security requirements of the organization. Topics may include administrative and physical safeguards to protect company and customer data.
Key Individuals and Access Rights: The key individuals who should have access to the system. Also address access rights for sub-contractors and any policies necessary to grant access on temporary basis.
Security Policies: Proposed security polices for the new system and details of any organization security requirements needed.
Security Items: Detailed suggestions of software, hardware, and other security measures required.
Budget Impact: How will the security costs increase the proposed budget, if at all?
Conclusion: Conclusion and reference page.

Post a Project Like This

Looking to make some money?

  • Set your budget and the time frame
  • Outline your proposal
  • Get paid for your work

Bids on this Project

  • shadman7 Profile Picture

    shadman7

    Dhaka,  Bangladesh

    I am Ethical Hacker, Penetration tester, programmer and Security Professional. I am a OWASP International Member. I can deliver you the most accurate, complete and cost-effective website security solutions available today. Some of my services is Malware Analyzing, Website Pentest, Vulnerability Patching, Security Monitoring, Exploit development, software testing, CMS pentest, Cloud System pentest including SaaS, PaaS, IaaS platform, SAP Pentest, Custom ERP Solution Pentest, Ddos and dos protection, Compliance solution like PCI-DSS 3, ISO 127001, Sox, OWASP top 10, SANS/CWE 25 and many more. You can give your custom security contract i will give you cost effective and perfect solution to you.

    Magento, 3D Rendering, Web Scraping, and Drupal

  • halderchitrak Profile Picture

    halderchitrak

    Bhopal,  India

    Substantial work in Information Technology

    Audio Services, Linux, Project Management, and Data Entry

  • dptsngh Profile Picture

    dptsngh

    Bhopal,  India

    3D Max, Maya, Logo Design, Concept Creation, Photoshop, Coral Draw .Net (C#) Windows Server, Ms Exchange, Active Directory, DNS, DHCP, LYNC, Sharepoint Zimbra, Puppet, Jenkins, Chef

    .NET, Banner Design, Logo Design, and Data Processing

  • Webbtech Profile Picture

    Webbtech

    Cassopolis,  United States

    I am anxious and ready to start working with freelancing again. I have many new skills along with my other past experience. I am willing to try most anything, I would love long term work. Full time is what I am looking for. I do work from home, I meet deadlines, and will continue to work on a project until the client is happy with the outcome. My goal is to add value to your business in whatever way I can!

    Banner Design, Logo Design, Photo Editing, and Business Cards

  • ddtaxe Profile Picture

    ddtaxe

    Sao Paulo,  Brazil

    I am an IT Architect and Security Professional whose qualifications include a degree in computer science; Certified Ethical hacker, helping corporations in protecting their assets. Strong knowledge in hacking, cracking, Web Security, Front End, Databases, network assessment. Also an expert in infrastructure (LAN, WAN, Cisco Router, Firewall and SwitchZ, Antispam, Antivírus, IDS/IPS, Content Filter, TCP/IP, DNS, DCHP, MPLS, FRAME RELAY, VPN, X.25, VLAN), Windows Server 2000/2003, Linux, Exchange 2000/2003, Active Directory, SNMPc, OpManager, Mcafee and Storage EMC and iSCSI, Web Servers (IIS, Apache, TomCat), Joomla, SQL Server, Oracle 9.x to 11.x, Citrix Metaframe, Virtualization Solutions (VMWARE, XEN, Virtuozzo), Code Decoding, Functional and Technical Specifications, COBIT, ITIL.

    Graphic Design, System Admin, Linux, and Social Networking

  • njhovanic Profile Picture

    njhovanic

    Pittsburgh,  United States

    I have 8 years of experience working in the IT security field. 5 of which specialize in Web App security. Over the past few years I have been involved with a mid-sized consulting firm that consults on projects from small companies all the way up to Fortune 1000 companies. Not only do I analyze technical findings but I also utilize business savvy knowledge and attempt to exploit findings within applications. Tools: -Burp -ZAP -DirBuster -SQLMap -XSS ME -Xenotix -BeEf -Many others Additional skills: - Network Penetration Tests - Vulnerability Assessments - Threat Landscape Reduction - Threat Modeling - Data Loss Prevention - Social Engineering - Security Awareness Training If hired I will provide a professional assessment report detailing my findings, in both the technical arena and high level areas as well. I work with employers to determine what they want to see in a report and exceed those expectations every time.

    PHP, Web Security, Testing / QA, and Computer Security

  • jewelahsan Profile Picture

    jewelahsan

    Dhaka,  Bangladesh

    To become a successful professional in the field of Information Technology and to work in an innovative and competitive world. To provide the best solution and support to the clients and to become best service provider company. Good command in Graphics, Photoshop, Web-design,Writing, Editing, Copy-writing, Ms Office, Article Writing, Reviews, Advertising, marketing, Accounting, Craigslist and other posting. and also on SEO

    Java, Javascript, Website Design, and Graphic Design

  • sveralex Profile Picture

    sveralex

    Rishon Lezion,  Israel

    I possess 10+ years experience in Web and Database Development, including Delphi, PERL, LAMP, CMS, Smarty, JavaScript, AJAX, jQuery, HTML, CSS, XML, JSON. MySQL, Delphi, PHP Certified. I have a proven track record of successful projects in various programming fields, including such CMS as WordPress, OpenCart, Prestashop, Magento. Communication and Feedback's is the most important input from you. So I am available around 16-18 hours a day. I provide 24 hours supports and free revisions.

    PHP, Perl, Website Design, and Translation