Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Please Write all the answers and dont copy from CHATGPT and Dont use chegg previous answers..Copy answers will definitely get Down thumbs and I will

Please Write all the answers and dont copy from CHATGPT and Dont use chegg previous answers..Copy answers will definitely get Down thumbs and I will write complaint against you for Google copied Answers..!
TASK 1:
In this task, you will design the capstone project approved by your instructor. You will write a report about the security problem you identified in Task 1 and compile the information for your solution to that security problem into a report. Your work for this task will not be evaluated until the appropriate forms from Task 1 have been submitted and evaluated.
A. Describe the security problem under investigation.
Explain the importance of the security problem, including background information and the environment in which the problem exists.
Provide documentation related to the security problem demonstrating the need for a solution. Referencing applicable white papers or articles.
Summarize each root cause of the problem in the identified environment where the security problem is situated, including supporting evidence, if applicable.
B. Summarize each internal and external project stakeholder role by including each of the following:
individual stakeholder implementation involvement and associated individual needs
how the security problem affects the stakeholder
stakeholder influence on the projects' objectives and outcomes
C. Describe the historical data used to support decision-making throughout the project (eg. vulnerability scans, penetration testing, testing or validation scenarios, audit results, etc.).
D. Provide a detailed explanation of the project requirements to implement the solution.
Describe the industry-standard methodologies guiding the solution's design and development.
Describe the project launch, including all phases of the rollout, the criteria used to determine the conclusion of implementation, and the project management methodology for implementation.
Describe the likelihood of all implementation risks and their impact on the project. E. Describe the training approach, including the audience, delivery, content, and duration.
F. Describe the required resources necessary to execute each project phase, and provide sources for all costs.
G. Describe all final project deliverables associated with the design and development of the technology solution.
Estimate the projected timeline, including each of the following:
each milestone and its duration
start and end dates.
resources assigned to each task
H. Detail the project evaluation approach that will be used to assess the project, addressing the following:
Describe the formative and summative test plans for the solution, including all required procedures and tools.
Describe the minimal acceptance criteria and key performance indicators for project acceptance as they align with your formative and summative test plans.
Justify the test cases and scenarios in the environment of the security problem being addressed.
Explain how you will analyze your results.
I. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
J. Demonstrate professional communication in the content and presentation of your submission.
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Graph Databases

Authors: Ian Robinson, Jim Webber, Emil Eifrem

1st Edition

1449356265, 978-1449356262

More Books

Students also viewed these Databases questions

Question

Can workers be trained in ethics? How? Defend your answer.

Answered: 1 week ago