Discovery and mitigation of threats

Assignment Help Business Management
Reference no: EM132442393

Discovery and Mitigation of Threats (Assignment 1)

Introduction

Human threats such as theft, terrorism, and malicious insider attacks are considered significant threats to XYZ Corporation, a multi-national company located in Las Vegas, Nevada. The international information technology security team has recently discovered host-to-host threats using footprinting techniques such as port scanning and session hijacking.

The IT security team decided to use host-to-host security protocols such as Secure Socket Layer (SSL) and Transport Layer Security (TLS) to mitigate the host-to-host threats. However, the cybersecurity blue team recommends the implementation of a symmetric algorithm such as Advanced Encryption Standard (AES) 256 to protect data in XYZ Corporation.

Instructions

The chief information security officer (CISO) has requested that you write a 5-7 page report to describe how the threats were discovered and evaluate approaches for mitigating them.

Your report must:

1. Describe procedures and tools (most likely) used to discover the port scanning threats and the systems impacted.

2. Describe procedures and tools (most likely) used to discover the session hijacking threats and the systems impacted.

3. Evaluate procedures and tools for mitigating these threats, including:

a. Secure Socket Layer.

b. Transport Layer Security.

c. Advanced Encryption Standard (AES) 256.

Reference no: EM132442393

Questions Cloud

Information systems infrastructure-evolution and trends : Research at least two articles on the topic of Information systems infrastructure: evolution and trends.
Information about the job context and environment : How would you gather information about the job context and environment? How could you use technology to show the positive and negative aspects of the job.
Family and medical leave act guarantee paid time off : How much leave is entitled to under the Family and Medical Leave Act? Does the Family and Medical Leave Act guarantee paid time off?
Managing customers-purpose of australian consumer law : Managing Customers-Explain purpose of the Australian Consumer Law and how it protects consumers' rights.Explain why unhappy customer is not good for business
Discovery and mitigation of threats : Discovery and Mitigation of Threats-Describe procedures and tools used to discover the port scanning threats and the systems impacted.
Incorporate boundary spanning leadership : How will you incorporate boundary spanning leadership into your everyday life? What challenges do you anticipate, and what impact do you hope to have?
Review security life cycle and configuration management : Develop physical security recommendations for an organization. Review the security life cycle and configuration management.
Recall time when you experienced winner curse : Recall time when you experienced winner's curse. Perhaps you purchased something for what you thought was a great price but quickly (or later) realized was not.
Differentiate forensics and incident response activities : Properly differentiate forensics and incident response activities. Recommend appropriate changes to existing architecture and IT assets of project organization.

Reviews

Write a Review

Business Management Questions & Answers

  Defining linear desion making

Define linear desion making and provide an example from personal experiences.

  Sustain competitive advantagesa

How Apple creates value and sustain competitive advantages?

  Why do organizations engage in customer segmentation

Why do organizations engage in customer segmentation? What are the different approaches that can be used for customer segmentation?

  Relationship between certifications and experience

Examine the relationship between certifications and experience. Do certifications alone identify the job candidates with the most appropriate expertise and work experience.

  What is the most ethical approach for the company to take

What is the most ethical approach for the company to take? Why? After conducting 10-15 minutes of research about your company online, briefly discuss a potential ethical issue or situation for this company.

  Perspective on the ingredients of effective leadership

Identify the most effective leader you have encountered in your own experience and list the respective leader's three traits and three behaviors which you believe most accounted for the leader's effectiveness. Discuss the impact of these traits an..

  Trimming process with interarrival times

Stacks of paper arrive at a trimming process with interarrival times of EXPO (10); all time are in minutes and the first stack arrives

  How important is the communication

How important is the communication at your job/home? Is it an environment open to learning, understanding and adopting the change?

  Innovation and product-oriented creativity in businesses

One perspective is an oriented towards product innovation and product-oriented creativity in businesses.

  Create two high-level process flow charts

1. Create two high-level process flow charts: a. Current state of the process from data gathering to product arrival at warehouse b. One potential future/ideal state scenario. (You may invent any existing or non-existing technology you like)

  International and domestic management

What do you already know, or want to learn about international and domestic management? Compare and contrast the differences between international management and domestic management.

  First principles of marketing

Using the First Principles of Marketing, convince a colleague who doesn't understand why you're studying marketing.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd