Reference no: EM132442393
Discovery and Mitigation of Threats (Assignment 1)
Introduction
Human threats such as theft, terrorism, and malicious insider attacks are considered significant threats to XYZ Corporation, a multi-national company located in Las Vegas, Nevada. The international information technology security team has recently discovered host-to-host threats using footprinting techniques such as port scanning and session hijacking.
The IT security team decided to use host-to-host security protocols such as Secure Socket Layer (SSL) and Transport Layer Security (TLS) to mitigate the host-to-host threats. However, the cybersecurity blue team recommends the implementation of a symmetric algorithm such as Advanced Encryption Standard (AES) 256 to protect data in XYZ Corporation.
Instructions
The chief information security officer (CISO) has requested that you write a 5-7 page report to describe how the threats were discovered and evaluate approaches for mitigating them.
Your report must:
1. Describe procedures and tools (most likely) used to discover the port scanning threats and the systems impacted.
2. Describe procedures and tools (most likely) used to discover the session hijacking threats and the systems impacted.
3. Evaluate procedures and tools for mitigating these threats, including:
a. Secure Socket Layer.
b. Transport Layer Security.
c. Advanced Encryption Standard (AES) 256.