Create a report on the threat scope

Assignment Help Computer Network Security
Reference no: EM13721068

Your task is to create a report on the threat scope against a specific target. There are three profiles for these threats, of which you choose one.

The three profiles are:

1) Policy Profile: You are the Chief Information Security Officer (CISO) for a large multinational enterprise with a very large collection of intellectual property that represents a major portion of your business' holdings. What are the threats against your corporate network, where do they come from and what do you need to mitigate against them? Keep in mind that, as a CISO, you are more interested in developing Policy and Procedure than day to day threat management.

2) Response Profile: You are a threat researcher for a Computer Emergency Response Team (CERT) that is responsible for protecting Government networks. The Government will be releasing an unpopular policy in the near future and is expecting attacks from "hacktivists". What are the sorts of cyber-attacks that can be expected? How can the agency organise itself now to help reduce the impact of those cyber-threats? Remember that Government agencies often have lots of partners and social media accounts.

3) Technical Level:You are a penetration tester providing services to a client (i.e. not the company you work for), who is a major national accounting firm. Identify the risks to your company in performing the penetration test, identify the standard framework for conducting a penetration test and the methods that you would employ to conduct the test.

Your assignment is to choose one of those profiles, and write a report that is at least 3000 words or 15 pages (whichever is longer). Your assignment should cover the above brief for your profile, and to also cover the following aspects:

- What are the countermeasures to those threats, and how do they fit within the Situational Crime Prevention framework?

- How does the current law help or hinder your countermeasures? Are there any proposals for laws that would assist?

- Is your problem of international scope and, if so, how?

Reference no: EM13721068

Questions Cloud

Nike csr challenge : In this assignment, you will analyze a strategic management case. This practice is a great way to understand and remember many strategic management concepts. You will read how others have applied strategic management and share your analysis of the..
Tierney enterprises is constructing its cash budget : Tierney Enterprises is constructing its cash budget. Its budgeted monthly sales are $5,000, and they are constant from month to month. 40% of its customers pay in the first month and take the 2% discount, while the remaining 60% pay in the mont..
Corporations often use different costs of capital : Corporations often use different costs of capital for different operating divisions. Using an example, calculate the weighted cost of capital (WACC). What are some potential issues in using varying techniques for cost of capital for different d..
Advanced technologies used for solar power generation : The advanced technologies used for solar power generation
Create a report on the threat scope : What are the counter measures to those threats, and how do they fit within the Situational Crime Prevention framework and how does the current law help or hinder your countermeasures? Are there any proposals for laws that would assist?
Large-scale database are available on several platforms : Large-scale database are available on several platforms. Among those are MySQL, SQL Server, and Oracle. Other than cost, why might an organization select MySQL over SQL Server or Oracle? If cost is not a consideration, is there an obvious d..
Prepare a career research report : You are required to research three specific fields of employment in your discipline that you are interested in pursuing a career in.
No problem can withstand the assault of sustained thinking. : When faced with a problem, what do you do to solve it? This assignment asks you to apply a six-step to problem solving process to a specific problem scenario. You will write a paper that presents a synthesis of your ideas about solving the prob..
Define a psychological contract : Define a psychological contract and describe the one that you made by entering college. What are your contributions, and what are the school's inducements?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Relationship between technical or it staff

Determine what your relationship would be like with the technical or IT staff at your corporation if you were working side by side on a project or training exercise?

  Identify and explain how the breach occurred

Identify the type of breach and identify and explain how the breach occurred (or suspicions by authorities as to how it may have occurred)

  Organization-severely lacks in appreciating need security

Organization that severely lacks in appreciating the need for security or a company that depends on equipment that is outdated and services from contractors that are low quality? Why?

  What is the single most important new technology

Need a research paper on "What is the single most important new technology that has affected digital forensics in the last five years and why?" The paper has to be well referenced.

  Intrusion detection system (ids)

concept of Data, information and knowledge in information warfare, politically motivated computer misdeeds, McClintock Manufacturing, Percentage of Windows systems that run antivirus software that is updated each day, network traffic that is evaluate..

  Security of information in business organisations

Definitions and descriptions of the terms, 'integrity', 'availability' 'confidentiality', 'authenticity' and 'non-repudiation' in relation to the security protection of information assets in the chosen topic environment, i.e. what is it about thes..

  Create an overloaded constructor

Create the statements to make an overloaded constructor for the class named Car. The constructors should support 0, 1, or 2 arguments. The 1st argument will denote engine size and contain an Integer.

  Responsibility of confidentiality to previous employer

You have taken a job with a software user who has contracted your previous employer to develop a system for them. However, you have also a responsibility of confidentiality to your previous employer.

  Analyze the header files of spams

Analyze the header files of spams. The file 199803.zip is a collection of spams received by someone during 1998 March (http://untroubled.org/spam/, other spam archives could be found at:http://spamlinks.net/filter-archives.htm, etc.).

  Design item hash table from using hash function

Design the 11-item hash table that results from using hash function h(i) = (i mod 11) to hash the keys 12, 44, 13, 88, 23, 94, 11, 39, 20, 16, and 5, for each of the following assumptions.

  In the past several years incidences such as school

in the past several years incidences such as school shootings have caused loss of many lives in us schools and

  Formulate plans for how to approach the immediate issue

formulate plans for how to approach the immediate issue with Stella, and to continue business in the future, assuming that they want to continue using only RSA. Assume that the directors do not know what RSA is and/or how it works.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd