Reference no: EM132718328
Part A:
Select an organization you wish to explore and use throughout the course.
As you make your selection, keep in mind that you will explore the following roles in the organization: Cyber Security Threat Analyst, Penetration Tester, Cyber Security Engineer, Risk Management Analyst, and Software Engineer. You need sufficient knowledge of the organization you select to complete these security assignments.
Part B:
A Cyber Security Threat Analyst conducts analysis, digital forensics, and targeting to identify, monitor, assess, and counter cyber-attack threats against information systems, critical infrastructure, and cyber-related interests.
Take on the role of a Cyber Security Threat Analyst for the organization you select. Use the Threats, Attacks, and Vulnerability Assessment Template to create a assessment document.
Research and include the following:
Tangible assets:
Include an assessment scope. The scope must include virtualization, cloud, database, network, mobile, and information system.
Asset descriptions:
Include a system model, A diagram and descriptions of each asset included in the assessment scope, and existing countermeasures already in place. (Microsoft® Visio® or Lucidhart®)
Threat agents and possible attacks
Exploitable vulnerabilities
Threat history
Evaluation of threats or impact of threats on the business
A prioritized list of identified risks
Countermeasures to reduce threat
What is computer forensics
: What is Computer Forensics and what are the different areas of Computer (or Digital as it is sometimes called) Forensics?
|
Give an example of a prima facie wrong act
: The Kantian (Deontological) Thesis: Some acts are intrinsically bad and cannot be made good by the goodness of their consequences.
|
Should hollings proceed with the new project
: Should Hollings proceed with the new project? Hollings Company, a furniture manufacturer, is considering investing in some new production
|
Case study-health care ethics
: When 23-year-old Jennifer Johnson arrived to give birth to her fourth child, hospital drug tests found traces of cocaine in her blood. It was later revealed
|
Cyber security-threat analyst and penetration tester
: As you make your selection, keep in mind that you will explore the following roles in the organization: Cyber Security Threat Analyst, Penetration Tester,
|
Determine three metrics that white feather corporation use
: Determine three metrics that White Feather Corporation (WFC) should use to evaluate the effectiveness of its college recruitment program.
|
Confucius political philosophy
: Based on what you have learned about Confucius's political philosophy, interpret the following saying:
|
Present the kalam cosmological argument
: The Kalam Cosmological Argument concludes with the claim that the universe has a cause of its existence.
|
Which are the capitalized costs of land and new building
: On January 6, Year 1, Lu Corporation purchased a tract of land. Which are the capitalized costs of the land and the new building, respectively?
|