Identify current vulnerabilities in the system and plan how to avoid those vulnerabilities in the new information system.
Cybersecurity Architecture and Engineering
The graduate designs technical specifications based on an organization’s security requirements.
The graduate identifies threats and vulnerabilities applicable to business systems and assets.
INTRODUCTION
As technology companies continue to move business services to the cloud, many companies are finding a need to upgrade the technological infrastructure. When implementing new architecture, IT companies will consult with IT security firms to identify current vulnerabilities in the system and plan how to avoid those vulnerabilities in the new information system.
For this task, you will use the attached “Healthy Body Wellness Center Case Study,” “Healthy Body Wellness Center Security Assessment Report,” and the “Business Requirements Document Template” to analyze, assess, and prioritize existing threats to the current architecture and design technical specifications to address identified threats.