Select Page

Step 1. Place your order

Fill in the order form and provide all details of your assignment.

Step 2. Make Payment

Choose the payment system that suits you most.

Step 3. Receive your paper

Once your paper is ready, we will email it to you.

As technology companies continue to move business services to the cloud, many co

by | Aug 17, 2022 | Other / cybersecurity | 0 comments

 

Place your order now for a similar assignment and have exceptional work written by our team of experts, At affordable rates

For This or a Similar Paper Click To Order Now

As technology companies continue to move business services to the cloud, many companies are finding a need to upgrade the technological infrastructure. When implementing new architecture, IT companies will consult with IT security firms to identify current vulnerabilities in the system and plan how to avoid those vulnerabilities in the new information system.
For this task, you will use the attached “Healthy Body Wellness Center Case Study,” “Healthy Body Wellness Center Security Assessment Report,” and the “Business Requirements Document Template” to analyze, assess, and prioritize existing threats to the current architecture and design technical specifications to address identified threats.
SCENARIO
You are the newly hired LAN administration and security manager at Healthy Body Wellness Center (HBWC). The HBWC includes the Office of Grants Giveaway (OGG), a growing department responsible for distributing hospital research grants.
The HBWC currently relies on a local area network (LAN), but plans to expand their services and hire more employees this year. It is evident the current cybersecurity architecture is limited and unable to meet current needs. In addition, HBWC’s cybersecurity architecture will need to transition to a wide area network (WAN).
Using the attached “Healthy Body Wellness Center Case Study” and “Healthy Body Wellness Center Security Assessment Report,” conduct a security analysis of HBWC’s current technologies and applications and identify threats to the company’s existing architecture. You will use the findings from your analysis to complete the attached “Business Requirements Document Template.”
REQUIREMENTS
Analyze HBWC’s existing architecture using the attached “Healthy Body Wellness Center Case Study” and “Healthy Body Wellness Center Security Assessment Report.” Consider common security needs and functionalities necessary to meet the needs of the target network as part of your analysis. Record all responses in the appropriate section of the attached “Business Requirements Document Template.”
A. Introduction – Summarize each aspect of the project summary, project scope, and system perspective based on the attached “Healthy Body Wellness Center Case Study” and “Healthy Body Wellness Company Security Assessment Report.” Use the “Introduction” of the attached “Business Requirements Document Template” to record your responses.
B. Business Process Overview – Describe the current business processes at HBWC and the proposed processes, including the interactions between systems and various business units. Include visual process flow diagrams to further illustrate the processes the new product will replace or enhance. Use the “Business Process Overview” section of the attached “Business Requirements Document Template” to record your responses for each aspect.
C. Business Requirements – Record the business requirements for the project, categorized by both priority and area of functionality addressing the needs from the “Healthy Body Wellness Center Case Study” and “Healthy Body Wellness Center Security Assessment Report.” Provide functional and nonfunctional requirements that can be followed throughout the project for the recorded business requirements. Use the Business Requirements Document (BRD) template to record your responses for each aspect of the document in the “Business Requirements” section.
D. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased or summarized.
E. Demonstrate professional communication in the content and presentation of your submission.

For This or a Similar Paper Click To Order Now

Confidentiality

We encrypt everything. It’s all confidential.

Secure Payment

Sleep tight: each transaction is encrypted and 100% secure.

Ready to get started?