CoverPage
Table of Contents
Abstract
Introduction
Current ITrust Application Database
Current Features
Current Vulnerabilities & Threats
Databases (addendum 1&2)
Database Vulnerabilities
Ranking
New ITrust Features and requirements
Added Role- emergency responder
Vulnerabilities of new features and requirements
Ranking
Recommended Changes 3-4 Pages
Recommended security measures which address these threats and vulnerabilities
Recommend changes to the company’s security management policies
How your team, over time, would adapt the requirements to reduce security risk.
Conclusion (This should be a collective effort as it is going to come from the overall paper)
Describe how your team came to a consensus concerning the prioritization of security issues.
Summarize what, as a team, you learned from this assignment
Recommended changes