Evaluate the threat environment of the organization

Assignment Help Computer Network Security
Reference no: EM131024940

Information assurance about BANK OF AMERICA ORGANIZATIOn information assurance plan

Minimum 3 citations

In order to effectively respond to applicable threats, information technology administrators must be able to accurately evaluate the threat environment. The ability to engage in this evaluation originates from the performance of a risk assessment. Performing a risk assessment can take on many forms. One recent method of engaging in risk assessment has come in the form of utilizing firewalls and firewall audit tools. Through these measures, IT administrators can map the network and critically analyze where any potential vulnerabilities may lie. The outcomes of these measures results in increased awareness of the most likely types of threats that may materialize, and enables administrators to configure the network in order to mitigate and address these weaknesses and vulnerabilities.

Prompt: In Module Five, you will submit the risk assessment portion of the information assurance plan. You will provide the organization with an assessment of the threat environment and the risks within, as well as methods designed to mitigate these risks. Based on your analysis and evaluation, what are the best approaches for implementing information assurance principles? Where do you see the most important areas for improvement to current protocols and policies?

Specifically, the following critical elements must be addressed:

Risk Assessment

a) Analyze the environment in which the organization operates, including the current protocols and policies in place related to information assurance.

b) Evaluate the threat environment of the organization.

c) Based on your analysis and evaluation, what are the best approaches for implementing information assurance principles? Where do you see the most important areas for improvement to current protocols and policies?

d) Assess the threats to and vulnerabilities of the organization by creating a risk matrix to outline the threats and vulnerabilities found and determine possible methods to mitigate the identified dangers.

Reference no: EM131024940

Questions Cloud

Prove that the eigenvectors of the transformation t : Prove that the eigenvectors of the transformation T : Complex numbers^2 -> complex numbers^2 given by T ( z , w ) = ( z + aw , w) span on 1-dimensional subspace of complex numbers^2 and give a basis for this subspace.
Write the net neutrality paper : Having read the "Transcending Net Neutrality: Ten Steps Toward an Open Internet" and "SOPA and PIPA What Went Wrong" papers, write the Net Neutrality paper.
What is the corresponding eigenvalue : Suppose that w is an eigenvector of A with eigenvalue β. Find an eigenvector for B which has the same eigenvalue β.
Determine the essential items that you will need to consider : Determine the essential items that you will need to consider prior to the network deployment, and explain the importance of each item in the deployment process.
Evaluate the threat environment of the organization : Evaluate the threat environment of the organization. Analyze the environment in which the organization operates, including the current protocols and policies in place related to information assurance.
Which species predominate at equilibrium reactant or product : Consider the reaction A + B ? C + D. Assume that both the forward reaction and the reverse reaction are elementary processes and that the value of the equilibrium constant is very large. Which species predominate at equilibrium, reactants or produ..
Levitate a conductive object in the magnetic field : Using a levitation coil, you levitate a conductive object in the magnetic field and heat within that field.
Verify the special theorem for the hermitian matrix : Show that for a real symmetric matrix A=A^T, its singular values are exactly the absolute values of its eigenvalues
Create the lorenz butterfly using linearized lorenz equation : The code MUST only use Gauss-Seidel iteration to run the iterations (no RK2 or other methods). The code may not use any built in Matlab functions or solvers or matrices to store answers. It needs to tell how much CPU time was used (incorporate tic..

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd