Design a multi-level target security architecture to support the organization’s security policy and technology choices and to include applicable policy guidance.

EXPECTED RESULT

1. Threat Identification
Identify threats and vulnerabilities applicable to business systems and assets.
2. Countering Threats and Vulnerabilities
Assesses the vulnerabilities with the Internet of Things (IoT) and web-based, mobile, and embedded systems.
3. Security Architecture in Practice
Design a multi-level target security architecture to support the organization’s security policy and technology choices and to include applicable policy guidance.

INTRODUCTION

Many organizations have legacy systems that are no longer meeting the organization’s requirements with regards to business processes and security. Laws such as the Health Insurance Portability and Accountability Act (HIPAA) require higher security standards since these laws were implemented, and new technology is now available that was not an option previously. A LAN administration and security manager may need to design a new system that will increase security and automate business processes more efficiently than the current legacy system.

Using the attached “Business Systems Design Report Template,” you will design and document a multilevel target security architecture to address cybersecurity threats to the Healthy Body Wellness Center (HBWC). You will also use the “Business Systems Design Report Template” to conduct, record, and audit your design, and provide justification to defend each aspect of your multilevel network architecture. You will then complete the attached “DREAD Workbook” and submit it as a separate attachment.

The “Healthy Body Wellness Center Case Study” and “Healthy Body Wellness Center Security Assessment Report” are attached for your reference; you may also refer to the “Business Requirements Document Template” you created in Task 1 to assist in the completion of this task.

Design a multi-level target security architecture to support the organization’s security policy and technology choices and to include applicable policy guidance.
Scroll to top