Reference no: EM13770599
Create a Matrix of Vulnerability Attributes and System Object
Complete the Matrix of Vulnerability Attributes and System Object Types of the RAND document. A policy to protect the infrastructure must be developed to identify threats and locate vulnerabilities. Complete the matrix to determine requirements for the policy. Review page 28, table 4.2 to understand how to complete a matrix. Complete the matrix on page 27, table 4.1 based on the scenario below. Fill in the type of threat/vulnerability and your recommendation to correct the threat/vulnerability.
Scenario
In the organization, there is an insider threat. The employee who is the threat has been discussing a perceived vulnerability in the system. Many of the employees believe this vulnerability in the system and are attempting to create a patch. The insider threat employee has created malware in the system separate from the alleged vulnerability. While the technical team is searching for a vulnerability, the malware is traveling through the system disrupting all network traffic. What is the issue? Identify the threats and vulnerabilities in the matrix for this scenario. Also, identify the resolutions and solutions. Separate the issues from the solutions in a table with two columns and submit to your assignment folder.
The issues are provided in Table 1. You will create resolutions/solutions for the threat or vulnerability below.
Table 4.1
Matrix of Vulnerability Attributes and System Object Types
RANDMR1601-table4.1
Behavioral sensitivity/Fragility
Malevolence
Rigidity
Malleability
Gullibility/Deceivability/naiveté
Complacency
Separate ability
Logic/Implementation
Errors; fallibility
Design sensitivity/Fragility/limits/
Finiteness
Unrecoverable
Singularity
Attributes
Uniqueness
Centrality
Homogeneity
Design/Architecture
Corruptibility/Controllability
Accessible/Detectable/Identifiable/Transparent/Interception
Hard to manage or control
Self-unawareness and unpredictability
Predictability Behavior General.
Difference between a simple interest note and a simple disco
: You decide to take out an ordinary interest loan of $30,000 at 4%, on a 90 day note. a.) In 45 days you decide to make a payment of $10,000 on the loan. What is your new principal? Explain how you got the answer. b.)How much did you pay at the end of..
|
What is the minimum bid per widget
: A firm is considering bidding on a project to produce eight widgets per year for the next four years. In order to complete the project, the firm must lease facilities for $30,000 per year, purchase equipment that costs $100,000, as well as pay labour..
|
Yield-to-maturity of a bond with a finite maturity
: The yield-to-maturity of a bond with a finite maturity date is a function of all of the following variables except:
|
What is occurring and the possible uses of the information
: Is the activity occurring in packets 9-18 abnormal? If so, provide a detailed interpretation of what is occurring, and the possible uses of the information gained. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I ..
|
Create matrix of vulnerability attributes and system object
: Create a Matrix of Vulnerability Attributes and System Object. A policy to protect the infrastructure must be developed to identify threats and locate vulnerabilities.
|
How to assign the cost of direct labor to each job
: What services does the firm oiler, what document or procedure do you use to collect the costs of services per formed for each customer and how to assign the cost of direct labor to each job?
|
What is the minimum-cost output
: What is the minimum-cost output? What is this manufacturer's fixed cost, For each level of output, calculate the variable cost (VC). For each level of output except zero output, calculate the average variable cost (AVC), average total cost (ATC), a..
|
What is meant by a protective put
: What is meant by a protective put? What position in call options is equivalent to a protective put?
|
Problem related to organization financial performance
: Evaluate your organization's financial performance during the past 2 years, using financial ratios. Calculate the ratios for each year:
|