Apply advanced and current concepts

Assignment Help Other Subject
Reference no: EM133650481

Threat Model - Penetration Testing

Learning Outcome 1: Critically analyse and evaluate security techniques used to protect complex heterogeneous environments and apply their findings for offering advice regarding solutions to decision makers

Learning Outcome 2: Apply advanced and current concepts/issues of computer systems risks, vulnerabilities, threats analysis, and software security in the context of a penetration test

Task

Your task is to critically analyse the literature with an emphasis on the current threat landscape. The current threat landscape identifies the threats, major trends observed with respect to threats, threat actors and attack techniques and it changes on an annual basis.

Based on this, you are asked to produce an Attack Tree against an organisation of your choosing and provide recommendations on how to protect against the attacks that you have modeled. Towards the completion of this task you need to:

Select an organisation and provide your assumptions about the company. Each organisation has a different threat profile, you need to specify your assumptions that make the Attack Tree relevant to the organisation and the current threat landscape.

Create an attack tree that matches the assumptions that you defined as well as is relevant to the threat landscape. The attack tree must show different ways in which the organisation can be attacked. Please do not submit hand-written attack trees. You will not score high marks unless your Attack Tree is relevant to the current threat landscape and your assumed scenario (i.e. organisation's threat profile). Please note that you will not receive any marks if you just provide yet another Attack Tree. The emphasis of your work should be the justification of how the Attack Tree models the threat profile of your selected organisation and how it relates to the current threat landscape.

c). Critically analyse and evaluate the security techniques, methods, controls and procedures that need to be applied in the scenario that you have provided in (a) and the Attack Tree that you have produced in (b). Similarly, to the advice that you were given for b) above, the empasis of the work is on the critical analysis and justification on how the proposed security recommendations match the assumptions that you have made and the Attack Tree that you have come up.

Your report must include a number of references to academic literature or industrial best practices to secure the organisation of this scenario. At minimum you are expected to have read 10 such resources.

You are required to submit a text report (up to 1000 words) written in either Microsoft Word or OpenOffice and submitted in a doc, docx, odt or fodt format using the submission link provided on Canvas. Please note it is your responsibility to ensure you will submit on time.
The following report structure is expected:

Chosen organisation and assumptions (200 words)
Attack Tree based on current threat landscape and scenario (400 words)
Security recommendations (400 words)

References.

Reference no: EM133650481

Questions Cloud

Do we throw the research out because of too much error : Do we throw the research out because of too much error, or is there something useful that it can tell us?
What would be the official diagnosis according to dsm five : PSY 2024- What would be the official diagnosis according to the DSM 5? What does the DSM tell us about the prognosis of someone with this diagnosis.
How is the checklist departure from the traditional approach : How has the medical profession typically dealt with this overwhelming responsibility? How is the checklist a departure from the traditional approach?
Relaxing with style is manufacturer of designer flip flops : Relaxing with Style is a manufacturer of designer flip flops. The cost of each pair of flip flops is the sum of three variable costs (direct material costs,
Apply advanced and current concepts : 7COM1068 Penetration Testing, University of Hertfordshire - Critically analyse and evaluate security techniques used to protect complex heterogeneous
How would you describe the way the film was shot : How would you describe the way this film was shot? How does Kubrick's direction instill fear in viewer? How does editing also demonstrate the genre of horror?
What were two goals and two objectives set for the clients : What were two goals and two objectives set for these clients? Did the therapist and client establish these goals and objectives together? Explain.
How did you feel about your first course in canvas : Did you feel the textbook was a good quality textbook? How did you feel about your first course in Canvas? Would you change anything about the course?
What is the basic structure of a support group meeting : What is the basic structure of a support group meeting; what is the leader's role; how does the group recognize success stories; what do they do for relapses.

Reviews

len3650481

2/27/2024 9:11:19 PM

Answer should be clear. Tree attack must break the CIA model. References not be older then 2023. Attack you used also not older 2023.

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd