Apply advanced and current concepts

Assignment Help Other Subject
Reference no: EM133650481

Threat Model - Penetration Testing

Learning Outcome 1: Critically analyse and evaluate security techniques used to protect complex heterogeneous environments and apply their findings for offering advice regarding solutions to decision makers

Learning Outcome 2: Apply advanced and current concepts/issues of computer systems risks, vulnerabilities, threats analysis, and software security in the context of a penetration test

Task

Your task is to critically analyse the literature with an emphasis on the current threat landscape. The current threat landscape identifies the threats, major trends observed with respect to threats, threat actors and attack techniques and it changes on an annual basis.

Based on this, you are asked to produce an Attack Tree against an organisation of your choosing and provide recommendations on how to protect against the attacks that you have modeled. Towards the completion of this task you need to:

Select an organisation and provide your assumptions about the company. Each organisation has a different threat profile, you need to specify your assumptions that make the Attack Tree relevant to the organisation and the current threat landscape.

Create an attack tree that matches the assumptions that you defined as well as is relevant to the threat landscape. The attack tree must show different ways in which the organisation can be attacked. Please do not submit hand-written attack trees. You will not score high marks unless your Attack Tree is relevant to the current threat landscape and your assumed scenario (i.e. organisation's threat profile). Please note that you will not receive any marks if you just provide yet another Attack Tree. The emphasis of your work should be the justification of how the Attack Tree models the threat profile of your selected organisation and how it relates to the current threat landscape.

c). Critically analyse and evaluate the security techniques, methods, controls and procedures that need to be applied in the scenario that you have provided in (a) and the Attack Tree that you have produced in (b). Similarly, to the advice that you were given for b) above, the empasis of the work is on the critical analysis and justification on how the proposed security recommendations match the assumptions that you have made and the Attack Tree that you have come up.

Your report must include a number of references to academic literature or industrial best practices to secure the organisation of this scenario. At minimum you are expected to have read 10 such resources.

You are required to submit a text report (up to 1000 words) written in either Microsoft Word or OpenOffice and submitted in a doc, docx, odt or fodt format using the submission link provided on Canvas. Please note it is your responsibility to ensure you will submit on time.
The following report structure is expected:

Chosen organisation and assumptions (200 words)
Attack Tree based on current threat landscape and scenario (400 words)
Security recommendations (400 words)

References.

Reference no: EM133650481

Questions Cloud

Do we throw the research out because of too much error : Do we throw the research out because of too much error, or is there something useful that it can tell us?
What would be the official diagnosis according to dsm five : PSY 2024- What would be the official diagnosis according to the DSM 5? What does the DSM tell us about the prognosis of someone with this diagnosis.
How is the checklist departure from the traditional approach : How has the medical profession typically dealt with this overwhelming responsibility? How is the checklist a departure from the traditional approach?
Relaxing with style is manufacturer of designer flip flops : Relaxing with Style is a manufacturer of designer flip flops. The cost of each pair of flip flops is the sum of three variable costs (direct material costs,
Apply advanced and current concepts : 7COM1068 Penetration Testing, University of Hertfordshire - Critically analyse and evaluate security techniques used to protect complex heterogeneous
How would you describe the way the film was shot : How would you describe the way this film was shot? How does Kubrick's direction instill fear in viewer? How does editing also demonstrate the genre of horror?
What were two goals and two objectives set for the clients : What were two goals and two objectives set for these clients? Did the therapist and client establish these goals and objectives together? Explain.
How did you feel about your first course in canvas : Did you feel the textbook was a good quality textbook? How did you feel about your first course in Canvas? Would you change anything about the course?
What is the basic structure of a support group meeting : What is the basic structure of a support group meeting; what is the leader's role; how does the group recognize success stories; what do they do for relapses.

Reviews

len3650481

2/27/2024 9:11:19 PM

Answer should be clear. Tree attack must break the CIA model. References not be older then 2023. Attack you used also not older 2023.

Write a Review

Other Subject Questions & Answers

  During the early republic the roman senate

During the early Republic, the Roman Senate

  Cultural surveys introduction

Do you think a study done in teh other country where the questionnaire has been translated to that language would produce the similar results as it would in English speaking countries?

  Explain to ryan some of the disadvantages of getting protein

Ryan's trainer at the gym swears by a protein shake and recommends that Ryan try it after workouts to increase protein synthesis in his muscle.

  American government

Which model of bureaucracy best explains the way the United States government currently operates? Why?

  Describe reasons for the decision reached in each case

Research and analyze (3) separate cases in which a teacher's individual rights were brought into question or denied; a teacher faced dismissal from his/her.

  Identify what options are available to the court

Identify what options are available to the courts to ensure the fundamental fairness that may be threatened by media exposure.

  Preparing to conduct business research

Which design (qualitative or quantitative) will become the primary research design? How can you most effectively use the power of both designs?

  What are the skill related components

What are the skill related components and Give examples of activities that will improve this components

  What benefits and challenges may develop

Very wealthy or influential public figures (such as Bill Clinton and Bill Gates) have become major funders in the global health arena.

  Describe the biological and physiological aspects

Describe the biological and physiological aspects of the health problem and potential chemical treatments or pathways that are affected

  How schizophrenia relates to genetics or brain chemistry

Contrast the positive and negative symptoms of schizophrenia and explain why it is thought these different symptoms might have a different physiological foundation.

  Describe biological factors associated with mental illness

Describe the biological, social, and political factors associated with mental illness. Describe different types of evidence-based treatment for mental disorders

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd