No plagiarized work. I need 8 to 9 page paper analyzing the security weaknesses within the company listed below. Two weaknesses within the existing company must be analyzed – hardware, software, or the existing security policy not to include the password policy. The two items (hardware, software, or policy ) must be identified as an item that requires security. To clarify an item that requires improved security, you must identify one of these items: · one hardware and one software weakness · one hardware and one policy weakness · one software and one policy weakness It must be in APA format and the Quality Web Design organization listed below is the Project Company Overview / Scenario. 6 Cited and verifiable resources are needed. Scholarly articles or sources I can gain access to are a must. The paper is due November 4th, 2014. I will pay $75 for QUALITY and on-time delivery. Suggested Reference – Security in Computing – Charles P. Pfleeger and Shari Lawrence Pfleeger Company Overview Quality Web Design (QWD) is an organization that specializes in Web site and Web content design for all types of businesses. QWD's mission is to provide top quality Web design that will increase consumer generated revenue to QWD's customer Web sites. QWD's database contains over 250,000 proprietary images and graphical designs that will enhance most Web site's appeal to a target demographic. Business Processes Quality Web Design has several mission critical business processes. First is the use of the repository of Web site templates, custom written scripts and/or custom applications. This repository is stored in a Microsoft Visual Studio Team Foundation Service (TFS) server. This application is used to monitor the project development lifecycle of custom Visual Studio applications from inception to deployment, including the quality assurance testing phase. Other critical business processes are QWD's accounting, payroll and Marketing operations all of which are supported by IT assets. There are strict technology-based access controls associated with each of these systems to ensure that only authorized personnel can access them. Digital Assets These are shown in the network diagrams below WAN · (2) T1 Frame Relay circuits connected to the Internet. · ISP controlled Internet routers · Corporate Firewall Model: Juniper ISG2000 integrated Firewall, VPN, and Intrusion Detection and Prevention system. Remote office firewall is a Juniper SSG140. · L2TP/IPSec VPN tunnel between the corporate firewall and the office firewall to allow for secure data flow. Corporate Office · Internal LAN switch is an HP 5400zl series with 147 ports with 10/100/1000 GB connectivity. · (2) HP ProCurve MSM410 Access Point US wireless access points. · Microsoft TFS code repository consists of 1 Web server, 1 application server, and 1 database code repository. · Web server includes, Microsoft Share Point portal for department document and Web sites. Corporate intr.