SlideShare a Scribd company logo
1 of 14
· THE INDUSTRY AND THE COMPANY AND ITS
PRODUCT(S) OR SERVICE(S)
A. The industry.- Tamara
B. The company and the concept- Tamara
C. The product(s) or service(s).- Tamara
D. Entry and growth strategy.- Arturo
· MARKET RESEARCH AND ANALYSIS
A. Customers.- Richard
B. Market size and trends.- Arturo
C. Competition and competitive edges.- Arturo
D. Estimated market share and sales.- Richard
E. Ongoing market evaluation.- Richard
· MARKETING PLAN
A. Overall marketing strategy.- Ryan
B. Pricing.- Ryan
C. Sales tactics.- Ryan
D. Service and warranty policies.- Ade
E. Advertising and promotion.- Ade
F. Distribution.- Ade
Deadline sent to Team Fileshare due- Saturday of each week by
4p.
Team Members in attendance-
Ryan, Richard, Arturo, Tamara, Ade
I. System Design Principles
A network system is a collection of integrated components that
works together, to
achieve a common objective. A system design is a process of
defining the system architecture,
modules, interfaces, data, and components of a system, to a
specified requirement.
Design principles describe the procedures that software
developers, system analyst, and
system architect designers, create through the distribution of
colors, texture, and the weight of
objects. This union describes the use of assets, so that there is
a structured and stable system
design, including system appearance, and security against
unauthorized access. Security design
principles are essential when designing any system to make sure
security and integrity is tamper
proof.
Various security design principles exist and designed by the
system developer, listed
below include security design principles:
1. The Principle of Least Privilege requires the system
developers to
limit user access rights to use specific tools and informatio n in
a system, this
privilege gives rights to access data and applications, only to
special users, with
limited access to other users.
The orientation of this design principle limits the system from
damaging
attacks from users of the system; whether they are intentional or
not, it also limits
the changes or damages a user can make on the system, and it
reduces interactions
with the system.
2. Fail Safe Defaults Principle administered by the system
developer
in charge of security, and authorizes users, to access system
resources, based on
granted access, rather than exclusion; this design principle
permits, the users, to
access resources, if permission is granted. By default, the users
do not have
access, to system resources, until authorization is given. This
design principle
prevents unauthorized users, from viewing resources. (Dennis &
Wixom, 2000)
3. Defense In-depth Principle is a concept used by system
developers
use security layers on system resources. This principle requires
users to provide
credentials when accessing a system resource. The security
experts because of
the operational results and effectiveness advocate defense In-
depth security
design principle. This principle manages the security risk with
diverse strategies
of defending; a good example is, if the first layer of security is
breached e.g.
firewall, the next layer will withstand the security breach, and
stop the security
breached.
4. Separate design principle authorizes each user with different
levels
of access into the system. An example: Administrator can
access the system
resources and root privileges, but the normal user cannot. This
design principle
denies an attacker, the ability to grant himself one privilege ,
but not a second
privilege, which will make it impossible, for the attacker, to
attack the system,
successively.
5. The Promote Privacy Principle advocates when one should
consider the privacy of the users of the system; the system
should not collect the
personal identification information of the users, and instead
protect and encrypt
information, and concealed from view. This design principle
ensures that the
users of the system, information protected, and not
compromised.
1
Security Management Plan
2
Contents
I. Project O utline (Week 1)
...............................................................................................
..... 3
II. Security Requirements (Week 1) .......................................
Error! Bookmark not defined.
III. Security Business Requirements (Week 2)
......................................................................... 7
IV. Security Business Requirements (Week 2) ........................
Error! Bookmark not defined.
V. Security Policy (Week 3)
...............................................................................................
..... 8
VI. System Design Principles (Week 4)
................................................................................... 9
VII. The Training Model (Week 5)
.......................................................................................... 10
VIII. References
.......................................................................... Error!
Bookmark not defined.
3
I. Project Outline (Week 1)
American Airlines developed in New York in nine-teen thirty
and become public in the
stock exchange in nineteen thirty nine. The company relocated
to Fort Worth Texas in nineteen
seventy-nine. The company created AMR Holdings in nineteen
eighty-two, this company gained
joint ownership in American Airlines and American Eagle.
AMR produced the financial backing
without taking part in operations. American Airlines is
formerly US Air; the airline currently is
worth billions of dollars. American Airlines is the largest
airline and connects with one thousand
airports worldwide; in one hundred fifty countries. The
passenger annual revenue averages one
hundred million dollars in the United States and internationally.
The company’s aircraft
inventory is thirty three hundred. American Airlines initiated
the first online booking, which
includes, flight information arrival, departure, seat information,
city, connecting flights, boarding
tickets, flight status, etc. In the year twenty fifteen, American
Airlines merged with US Air to
form the largest airline conglomerate in the world. The
company contributes to more than nine
hundred thousand jobs in the United States and Internationally.
A. Organizational Structure
The Program Manager; manages the projects financial,
organizational, and schedules.
This individual makes sure, project activities, achieved on
schedule, and within budget
restrictions. Certifies that established program, project criteria,
and practices met; confirms
quality of products. Categorizes, monitors, and manages risks,
within acknowledged constraints.
The Senior Enterprise Architect certifies continuous integration
of architectures. The
individual in this position performs impact analyses with,
upkeep from domain architects, and
maintenance development of business cases for IT projects.
Incumbent suggests architecture
4
strategy and planning guidance to the project team. Implements
an active role in recognizing
evaluations and needs of need for new technologies.
The Technology Architect cultivates and retains the Technical
Reference Model and
Standards identification correspondence. This individual
evaluates, investigates, suggests, and
identifies system environments, such as networks, nodes,
operating systems, servers, and
middleware.
The Business Architect evaluates data documents, business
processes, states, and
information flow. This individual supports, the progress of
business cases of projects, certifies
that business goals and strategies documented.
The Information and Data Architect evaluates and makes
documentation of business
processes and information; which includes physical and logical,
documentation of relationships.
This individual suggests, data architecture improvements,
related to, information use
requirements. Certifies data standard compliance administered.
The Applications Architect evaluates system documents,
external and internal modules,
control, and data movement. This individual evaluates and
suggests standards and tools, used in
application development. Also suggests, strategies for system
architecture.
The Chief Security Officer (CFO) plays a huge role in the
advancement of a secured
system architecture. This individual manages documents,
security features of the enterprise
architecture system, financial budgeting costs, vulnerability
calculations, access, design, and
authentication. Makes sure security summaries identified and
sustained for all application
processes.
5
The Technical Writer oversees and creates, documentation
regarding the repository
making sure content is understandable, usable, and follow
content management standards.
Repository and Configuration Manager oversees the
maintenance of documents and
performs audits, content management tools, and report
configurations.
B. Memo
TO: Security Team
FROM: Project Manager
DATE: August 22, 2016
SUBJECT: Work Group Communication Flows
Managing information across the network consists of handling
the logical and
physical network architecture. A comprehensive strategy and
plan for the security of the
network infrastructure includes policy and standard
requirements for network assets.
Development of policies for accountability of risks, logs,
authorization, users, and
monitoring, for potential risks;
Identify threats & breaches in the system applications, network,
and equipment;
Define routing and firewalls to identify network structure;
Define data centers, communication branches, and delimited
zones;
Define encryption, integrity, and confidentiality standards;
Define network architecture structure.
The communication flow and analysis includes voice, data, and
video signaling
across the network infrastructure. A strategic plan of the
security management needed
6
for data to travel over the intranets and extranets. Organized
internet policies, standards,
controls, and policies developed to provide a secured network
system. System devices
includes, cabling, topologies, network services, and devices.
The Project Manager oversees a structured approach and the
CSO is responsible
for all directives of the Security Management Plan. I look
forward to all input of
strategies and a scheduled timeline of all events pertinent in the
security development of
the system infrastructure.
7
II. Security Business Requirements (Week 2)
8
III. Security Policy (Week 3)
9
IV. System Design Principles (Week 4)
10
V. The Training Model (Week 5)
11
VI. References

More Related Content

Similar to · THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx

Running Head 2Week #8 MidTerm Assignment .docx
Running Head    2Week #8 MidTerm Assignment               .docxRunning Head    2Week #8 MidTerm Assignment               .docx
Running Head 2Week #8 MidTerm Assignment .docxhealdkathaleen
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information SecuritySARJERAO Sarju
 
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
INTERNAL Assign no   207( JAIPUR NATIONAL UNI)INTERNAL Assign no   207( JAIPUR NATIONAL UNI)
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)Partha_bappa
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxwkyra78
 
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
Presentation(group j)implementing  trustworthy computing by Sundas IlyasPresentation(group j)implementing  trustworthy computing by Sundas Ilyas
Presentation(group j)implementing trustworthy computing by Sundas IlyasSundas Kayani
 
Ise viii-information and network security [10 is835]-solution
Ise viii-information and network  security [10 is835]-solutionIse viii-information and network  security [10 is835]-solution
Ise viii-information and network security [10 is835]-solutionVivek Maurya
 
It Security Audit Process
It Security Audit ProcessIt Security Audit Process
It Security Audit ProcessRam Srivastava
 
DIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxDIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxcuddietheresa
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docxLynellBull52
 
Project Access Control ProposalPurposeThis course project i.docx
Project Access Control ProposalPurposeThis course project i.docxProject Access Control ProposalPurposeThis course project i.docx
Project Access Control ProposalPurposeThis course project i.docxstilliegeorgiana
 
This domain reviews the diverse areas of knowledge needed to develop and man...
This domain reviews the diverse areas of  knowledge needed to develop and man...This domain reviews the diverse areas of  knowledge needed to develop and man...
This domain reviews the diverse areas of knowledge needed to develop and man...bikheet
 
PurposeThis course project is intended to assess your abilit
PurposeThis course project is intended to assess your abilitPurposeThis course project is intended to assess your abilit
PurposeThis course project is intended to assess your abilitTakishaPeck109
 
I need 10 pages of report and 10 slides PurposeThis course p
I need 10 pages of report and 10 slides PurposeThis course pI need 10 pages of report and 10 slides PurposeThis course p
I need 10 pages of report and 10 slides PurposeThis course pdoylymaura
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentationAlan Holyoke
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security madunix
 

Similar to · THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx (20)

Running Head 2Week #8 MidTerm Assignment .docx
Running Head    2Week #8 MidTerm Assignment               .docxRunning Head    2Week #8 MidTerm Assignment               .docx
Running Head 2Week #8 MidTerm Assignment .docx
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information Security
 
Unit Iii
Unit IiiUnit Iii
Unit Iii
 
File000169
File000169File000169
File000169
 
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
INTERNAL Assign no   207( JAIPUR NATIONAL UNI)INTERNAL Assign no   207( JAIPUR NATIONAL UNI)
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
 
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
Presentation(group j)implementing  trustworthy computing by Sundas IlyasPresentation(group j)implementing  trustworthy computing by Sundas Ilyas
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
 
Ch06 Policy
Ch06 PolicyCh06 Policy
Ch06 Policy
 
Ise viii-information and network security [10 is835]-solution
Ise viii-information and network  security [10 is835]-solutionIse viii-information and network  security [10 is835]-solution
Ise viii-information and network security [10 is835]-solution
 
It Security Audit Process
It Security Audit ProcessIt Security Audit Process
It Security Audit Process
 
DIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxDIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docx
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
 
Project Access Control ProposalPurposeThis course project i.docx
Project Access Control ProposalPurposeThis course project i.docxProject Access Control ProposalPurposeThis course project i.docx
Project Access Control ProposalPurposeThis course project i.docx
 
This domain reviews the diverse areas of knowledge needed to develop and man...
This domain reviews the diverse areas of  knowledge needed to develop and man...This domain reviews the diverse areas of  knowledge needed to develop and man...
This domain reviews the diverse areas of knowledge needed to develop and man...
 
Applying Lean for information security operations centre
Applying Lean for information security operations centreApplying Lean for information security operations centre
Applying Lean for information security operations centre
 
PurposeThis course project is intended to assess your abilit
PurposeThis course project is intended to assess your abilitPurposeThis course project is intended to assess your abilit
PurposeThis course project is intended to assess your abilit
 
I need 10 pages of report and 10 slides PurposeThis course p
I need 10 pages of report and 10 slides PurposeThis course pI need 10 pages of report and 10 slides PurposeThis course p
I need 10 pages of report and 10 slides PurposeThis course p
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 
CCA study group
CCA study groupCCA study group
CCA study group
 

More from oswald1horne84988

1 Network Analysis and Design This assignment is.docx
1  Network Analysis and Design  This assignment is.docx1  Network Analysis and Design  This assignment is.docx
1 Network Analysis and Design This assignment is.docxoswald1horne84988
 
1 Name _____________________________ MTH129 Fall .docx
1  Name  _____________________________ MTH129 Fall .docx1  Name  _____________________________ MTH129 Fall .docx
1 Name _____________________________ MTH129 Fall .docxoswald1horne84988
 
1 Lab 8 -Ballistic Pendulum Since you will be desig.docx
1  Lab 8 -Ballistic Pendulum Since you will be desig.docx1  Lab 8 -Ballistic Pendulum Since you will be desig.docx
1 Lab 8 -Ballistic Pendulum Since you will be desig.docxoswald1horne84988
 
1 I Samuel 8-10 Israel Asks for a King 8 When S.docx
1  I Samuel 8-10 Israel Asks for a King 8 When S.docx1  I Samuel 8-10 Israel Asks for a King 8 When S.docx
1 I Samuel 8-10 Israel Asks for a King 8 When S.docxoswald1horne84988
 
1 Journal Entry #9 What principle did you select .docx
1  Journal Entry #9 What principle did you select .docx1  Journal Entry #9 What principle did you select .docx
1 Journal Entry #9 What principle did you select .docxoswald1horne84988
 
1 HCA 448 Case 2 for 10042018 Recently, a pat.docx
1  HCA 448 Case 2 for 10042018 Recently, a pat.docx1  HCA 448 Case 2 for 10042018 Recently, a pat.docx
1 HCA 448 Case 2 for 10042018 Recently, a pat.docxoswald1horne84988
 
1 Chapter 2 Understanding Rhetoric Goal To re.docx
1  Chapter 2 Understanding Rhetoric  Goal To re.docx1  Chapter 2 Understanding Rhetoric  Goal To re.docx
1 Chapter 2 Understanding Rhetoric Goal To re.docxoswald1horne84988
 
1 HC2091 Finance for Business Trimester 2 2.docx
1  HC2091 Finance for Business      Trimester 2 2.docx1  HC2091 Finance for Business      Trimester 2 2.docx
1 HC2091 Finance for Business Trimester 2 2.docxoswald1horne84988
 
1 ECE 175 Computer Programming for Engineering Applica.docx
1  ECE 175 Computer Programming for Engineering Applica.docx1  ECE 175 Computer Programming for Engineering Applica.docx
1 ECE 175 Computer Programming for Engineering Applica.docxoswald1horne84988
 
1 Cinemark Holdings Inc. Simulated ERM Program .docx
1  Cinemark Holdings Inc. Simulated ERM Program  .docx1  Cinemark Holdings Inc. Simulated ERM Program  .docx
1 Cinemark Holdings Inc. Simulated ERM Program .docxoswald1horne84988
 
1 Figure 1 Picture of Richard Selzer Richard Selz.docx
1  Figure 1 Picture of Richard Selzer Richard Selz.docx1  Figure 1 Picture of Richard Selzer Richard Selz.docx
1 Figure 1 Picture of Richard Selzer Richard Selz.docxoswald1horne84988
 
1 Films on Africa 1. A star () next to a film i.docx
1  Films on Africa  1. A star () next to a film i.docx1  Films on Africa  1. A star () next to a film i.docx
1 Films on Africa 1. A star () next to a film i.docxoswald1horne84988
 
1 Contemporary Approaches in Management of Risk in .docx
1  Contemporary Approaches in Management of Risk in .docx1  Contemporary Approaches in Management of Risk in .docx
1 Contemporary Approaches in Management of Risk in .docxoswald1horne84988
 
1 Assignment front Sheet Qualification Unit n.docx
1  Assignment front Sheet   Qualification Unit n.docx1  Assignment front Sheet   Qualification Unit n.docx
1 Assignment front Sheet Qualification Unit n.docxoswald1horne84988
 
1 BBS300 Empirical Research Methods for Business .docx
1  BBS300 Empirical  Research  Methods  for  Business .docx1  BBS300 Empirical  Research  Methods  for  Business .docx
1 BBS300 Empirical Research Methods for Business .docxoswald1horne84988
 
1 ASSIGNMENT 7 C – MERGING DATA FILES IN STATA Do.docx
1  ASSIGNMENT 7 C – MERGING DATA FILES IN STATA Do.docx1  ASSIGNMENT 7 C – MERGING DATA FILES IN STATA Do.docx
1 ASSIGNMENT 7 C – MERGING DATA FILES IN STATA Do.docxoswald1horne84988
 
1 Assessment details for ALL students Assessment item.docx
1  Assessment details for ALL students Assessment item.docx1  Assessment details for ALL students Assessment item.docx
1 Assessment details for ALL students Assessment item.docxoswald1horne84988
 
1 CDU APA 6th Referencing Style Guide (Febru.docx
1  CDU APA 6th  Referencing Style Guide (Febru.docx1  CDU APA 6th  Referencing Style Guide (Febru.docx
1 CDU APA 6th Referencing Style Guide (Febru.docxoswald1horne84988
 
1 BIOL 102 Lab 9 Simulated ABO and Rh Blood Typing.docx
1  BIOL 102 Lab 9 Simulated ABO and Rh Blood Typing.docx1  BIOL 102 Lab 9 Simulated ABO and Rh Blood Typing.docx
1 BIOL 102 Lab 9 Simulated ABO and Rh Blood Typing.docxoswald1horne84988
 
1 Business Intelligence Case Project Backgro.docx
1  Business Intelligence Case    Project Backgro.docx1  Business Intelligence Case    Project Backgro.docx
1 Business Intelligence Case Project Backgro.docxoswald1horne84988
 

More from oswald1horne84988 (20)

1 Network Analysis and Design This assignment is.docx
1  Network Analysis and Design  This assignment is.docx1  Network Analysis and Design  This assignment is.docx
1 Network Analysis and Design This assignment is.docx
 
1 Name _____________________________ MTH129 Fall .docx
1  Name  _____________________________ MTH129 Fall .docx1  Name  _____________________________ MTH129 Fall .docx
1 Name _____________________________ MTH129 Fall .docx
 
1 Lab 8 -Ballistic Pendulum Since you will be desig.docx
1  Lab 8 -Ballistic Pendulum Since you will be desig.docx1  Lab 8 -Ballistic Pendulum Since you will be desig.docx
1 Lab 8 -Ballistic Pendulum Since you will be desig.docx
 
1 I Samuel 8-10 Israel Asks for a King 8 When S.docx
1  I Samuel 8-10 Israel Asks for a King 8 When S.docx1  I Samuel 8-10 Israel Asks for a King 8 When S.docx
1 I Samuel 8-10 Israel Asks for a King 8 When S.docx
 
1 Journal Entry #9 What principle did you select .docx
1  Journal Entry #9 What principle did you select .docx1  Journal Entry #9 What principle did you select .docx
1 Journal Entry #9 What principle did you select .docx
 
1 HCA 448 Case 2 for 10042018 Recently, a pat.docx
1  HCA 448 Case 2 for 10042018 Recently, a pat.docx1  HCA 448 Case 2 for 10042018 Recently, a pat.docx
1 HCA 448 Case 2 for 10042018 Recently, a pat.docx
 
1 Chapter 2 Understanding Rhetoric Goal To re.docx
1  Chapter 2 Understanding Rhetoric  Goal To re.docx1  Chapter 2 Understanding Rhetoric  Goal To re.docx
1 Chapter 2 Understanding Rhetoric Goal To re.docx
 
1 HC2091 Finance for Business Trimester 2 2.docx
1  HC2091 Finance for Business      Trimester 2 2.docx1  HC2091 Finance for Business      Trimester 2 2.docx
1 HC2091 Finance for Business Trimester 2 2.docx
 
1 ECE 175 Computer Programming for Engineering Applica.docx
1  ECE 175 Computer Programming for Engineering Applica.docx1  ECE 175 Computer Programming for Engineering Applica.docx
1 ECE 175 Computer Programming for Engineering Applica.docx
 
1 Cinemark Holdings Inc. Simulated ERM Program .docx
1  Cinemark Holdings Inc. Simulated ERM Program  .docx1  Cinemark Holdings Inc. Simulated ERM Program  .docx
1 Cinemark Holdings Inc. Simulated ERM Program .docx
 
1 Figure 1 Picture of Richard Selzer Richard Selz.docx
1  Figure 1 Picture of Richard Selzer Richard Selz.docx1  Figure 1 Picture of Richard Selzer Richard Selz.docx
1 Figure 1 Picture of Richard Selzer Richard Selz.docx
 
1 Films on Africa 1. A star () next to a film i.docx
1  Films on Africa  1. A star () next to a film i.docx1  Films on Africa  1. A star () next to a film i.docx
1 Films on Africa 1. A star () next to a film i.docx
 
1 Contemporary Approaches in Management of Risk in .docx
1  Contemporary Approaches in Management of Risk in .docx1  Contemporary Approaches in Management of Risk in .docx
1 Contemporary Approaches in Management of Risk in .docx
 
1 Assignment front Sheet Qualification Unit n.docx
1  Assignment front Sheet   Qualification Unit n.docx1  Assignment front Sheet   Qualification Unit n.docx
1 Assignment front Sheet Qualification Unit n.docx
 
1 BBS300 Empirical Research Methods for Business .docx
1  BBS300 Empirical  Research  Methods  for  Business .docx1  BBS300 Empirical  Research  Methods  for  Business .docx
1 BBS300 Empirical Research Methods for Business .docx
 
1 ASSIGNMENT 7 C – MERGING DATA FILES IN STATA Do.docx
1  ASSIGNMENT 7 C – MERGING DATA FILES IN STATA Do.docx1  ASSIGNMENT 7 C – MERGING DATA FILES IN STATA Do.docx
1 ASSIGNMENT 7 C – MERGING DATA FILES IN STATA Do.docx
 
1 Assessment details for ALL students Assessment item.docx
1  Assessment details for ALL students Assessment item.docx1  Assessment details for ALL students Assessment item.docx
1 Assessment details for ALL students Assessment item.docx
 
1 CDU APA 6th Referencing Style Guide (Febru.docx
1  CDU APA 6th  Referencing Style Guide (Febru.docx1  CDU APA 6th  Referencing Style Guide (Febru.docx
1 CDU APA 6th Referencing Style Guide (Febru.docx
 
1 BIOL 102 Lab 9 Simulated ABO and Rh Blood Typing.docx
1  BIOL 102 Lab 9 Simulated ABO and Rh Blood Typing.docx1  BIOL 102 Lab 9 Simulated ABO and Rh Blood Typing.docx
1 BIOL 102 Lab 9 Simulated ABO and Rh Blood Typing.docx
 
1 Business Intelligence Case Project Backgro.docx
1  Business Intelligence Case    Project Backgro.docx1  Business Intelligence Case    Project Backgro.docx
1 Business Intelligence Case Project Backgro.docx
 

Recently uploaded

Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 

· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx

  • 1. · THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S) A. The industry.- Tamara B. The company and the concept- Tamara C. The product(s) or service(s).- Tamara D. Entry and growth strategy.- Arturo · MARKET RESEARCH AND ANALYSIS A. Customers.- Richard B. Market size and trends.- Arturo C. Competition and competitive edges.- Arturo D. Estimated market share and sales.- Richard E. Ongoing market evaluation.- Richard · MARKETING PLAN A. Overall marketing strategy.- Ryan B. Pricing.- Ryan C. Sales tactics.- Ryan D. Service and warranty policies.- Ade E. Advertising and promotion.- Ade F. Distribution.- Ade Deadline sent to Team Fileshare due- Saturday of each week by 4p. Team Members in attendance- Ryan, Richard, Arturo, Tamara, Ade I. System Design Principles
  • 2. A network system is a collection of integrated components that works together, to achieve a common objective. A system design is a process of defining the system architecture, modules, interfaces, data, and components of a system, to a specified requirement. Design principles describe the procedures that software developers, system analyst, and system architect designers, create through the distribution of colors, texture, and the weight of objects. This union describes the use of assets, so that there is a structured and stable system design, including system appearance, and security against unauthorized access. Security design principles are essential when designing any system to make sure security and integrity is tamper proof. Various security design principles exist and designed by the system developer, listed below include security design principles: 1. The Principle of Least Privilege requires the system developers to limit user access rights to use specific tools and informatio n in a system, this
  • 3. privilege gives rights to access data and applications, only to special users, with limited access to other users. The orientation of this design principle limits the system from damaging attacks from users of the system; whether they are intentional or not, it also limits the changes or damages a user can make on the system, and it reduces interactions with the system. 2. Fail Safe Defaults Principle administered by the system developer in charge of security, and authorizes users, to access system resources, based on granted access, rather than exclusion; this design principle permits, the users, to access resources, if permission is granted. By default, the users do not have access, to system resources, until authorization is given. This design principle prevents unauthorized users, from viewing resources. (Dennis & Wixom, 2000)
  • 4. 3. Defense In-depth Principle is a concept used by system developers use security layers on system resources. This principle requires users to provide credentials when accessing a system resource. The security experts because of the operational results and effectiveness advocate defense In- depth security design principle. This principle manages the security risk with diverse strategies of defending; a good example is, if the first layer of security is breached e.g. firewall, the next layer will withstand the security breach, and stop the security breached. 4. Separate design principle authorizes each user with different levels of access into the system. An example: Administrator can access the system resources and root privileges, but the normal user cannot. This design principle denies an attacker, the ability to grant himself one privilege , but not a second
  • 5. privilege, which will make it impossible, for the attacker, to attack the system, successively. 5. The Promote Privacy Principle advocates when one should consider the privacy of the users of the system; the system should not collect the personal identification information of the users, and instead protect and encrypt information, and concealed from view. This design principle ensures that the users of the system, information protected, and not compromised. 1 Security Management Plan
  • 6. 2 Contents I. Project O utline (Week 1) ............................................................................................... ..... 3 II. Security Requirements (Week 1) ....................................... Error! Bookmark not defined. III. Security Business Requirements (Week 2) ......................................................................... 7 IV. Security Business Requirements (Week 2) ........................ Error! Bookmark not defined. V. Security Policy (Week 3) ............................................................................................... ..... 8 VI. System Design Principles (Week 4) ................................................................................... 9 VII. The Training Model (Week 5) .......................................................................................... 10 VIII. References
  • 7. .......................................................................... Error! Bookmark not defined. 3 I. Project Outline (Week 1) American Airlines developed in New York in nine-teen thirty and become public in the stock exchange in nineteen thirty nine. The company relocated to Fort Worth Texas in nineteen seventy-nine. The company created AMR Holdings in nineteen eighty-two, this company gained joint ownership in American Airlines and American Eagle. AMR produced the financial backing without taking part in operations. American Airlines is formerly US Air; the airline currently is worth billions of dollars. American Airlines is the largest airline and connects with one thousand airports worldwide; in one hundred fifty countries. The passenger annual revenue averages one hundred million dollars in the United States and internationally. The company’s aircraft
  • 8. inventory is thirty three hundred. American Airlines initiated the first online booking, which includes, flight information arrival, departure, seat information, city, connecting flights, boarding tickets, flight status, etc. In the year twenty fifteen, American Airlines merged with US Air to form the largest airline conglomerate in the world. The company contributes to more than nine hundred thousand jobs in the United States and Internationally. A. Organizational Structure The Program Manager; manages the projects financial, organizational, and schedules. This individual makes sure, project activities, achieved on schedule, and within budget restrictions. Certifies that established program, project criteria, and practices met; confirms quality of products. Categorizes, monitors, and manages risks, within acknowledged constraints. The Senior Enterprise Architect certifies continuous integration of architectures. The individual in this position performs impact analyses with, upkeep from domain architects, and
  • 9. maintenance development of business cases for IT projects. Incumbent suggests architecture 4 strategy and planning guidance to the project team. Implements an active role in recognizing evaluations and needs of need for new technologies. The Technology Architect cultivates and retains the Technical Reference Model and Standards identification correspondence. This individual evaluates, investigates, suggests, and identifies system environments, such as networks, nodes, operating systems, servers, and middleware. The Business Architect evaluates data documents, business processes, states, and information flow. This individual supports, the progress of business cases of projects, certifies that business goals and strategies documented. The Information and Data Architect evaluates and makes documentation of business processes and information; which includes physical and logical, documentation of relationships.
  • 10. This individual suggests, data architecture improvements, related to, information use requirements. Certifies data standard compliance administered. The Applications Architect evaluates system documents, external and internal modules, control, and data movement. This individual evaluates and suggests standards and tools, used in application development. Also suggests, strategies for system architecture. The Chief Security Officer (CFO) plays a huge role in the advancement of a secured system architecture. This individual manages documents, security features of the enterprise architecture system, financial budgeting costs, vulnerability calculations, access, design, and authentication. Makes sure security summaries identified and sustained for all application processes. 5 The Technical Writer oversees and creates, documentation regarding the repository
  • 11. making sure content is understandable, usable, and follow content management standards. Repository and Configuration Manager oversees the maintenance of documents and performs audits, content management tools, and report configurations. B. Memo TO: Security Team FROM: Project Manager DATE: August 22, 2016 SUBJECT: Work Group Communication Flows Managing information across the network consists of handling the logical and physical network architecture. A comprehensive strategy and plan for the security of the network infrastructure includes policy and standard requirements for network assets. Development of policies for accountability of risks, logs, authorization, users, and monitoring, for potential risks; Identify threats & breaches in the system applications, network,
  • 12. and equipment; Define routing and firewalls to identify network structure; Define data centers, communication branches, and delimited zones; Define encryption, integrity, and confidentiality standards; Define network architecture structure. The communication flow and analysis includes voice, data, and video signaling across the network infrastructure. A strategic plan of the security management needed 6 for data to travel over the intranets and extranets. Organized internet policies, standards, controls, and policies developed to provide a secured network system. System devices includes, cabling, topologies, network services, and devices. The Project Manager oversees a structured approach and the CSO is responsible for all directives of the Security Management Plan. I look forward to all input of strategies and a scheduled timeline of all events pertinent in the
  • 13. security development of the system infrastructure. 7 II. Security Business Requirements (Week 2) 8 III. Security Policy (Week 3) 9 IV. System Design Principles (Week 4) 10
  • 14. V. The Training Model (Week 5) 11 VI. References