Evaluate the threat environment of the organization

Assignment Help Computer Network Security
Reference no: EM131024940

Information assurance about BANK OF AMERICA ORGANIZATIOn information assurance plan

Minimum 3 citations

In order to effectively respond to applicable threats, information technology administrators must be able to accurately evaluate the threat environment. The ability to engage in this evaluation originates from the performance of a risk assessment. Performing a risk assessment can take on many forms. One recent method of engaging in risk assessment has come in the form of utilizing firewalls and firewall audit tools. Through these measures, IT administrators can map the network and critically analyze where any potential vulnerabilities may lie. The outcomes of these measures results in increased awareness of the most likely types of threats that may materialize, and enables administrators to configure the network in order to mitigate and address these weaknesses and vulnerabilities.

Prompt: In Module Five, you will submit the risk assessment portion of the information assurance plan. You will provide the organization with an assessment of the threat environment and the risks within, as well as methods designed to mitigate these risks. Based on your analysis and evaluation, what are the best approaches for implementing information assurance principles? Where do you see the most important areas for improvement to current protocols and policies?

Specifically, the following critical elements must be addressed:

Risk Assessment

a) Analyze the environment in which the organization operates, including the current protocols and policies in place related to information assurance.

b) Evaluate the threat environment of the organization.

c) Based on your analysis and evaluation, what are the best approaches for implementing information assurance principles? Where do you see the most important areas for improvement to current protocols and policies?

d) Assess the threats to and vulnerabilities of the organization by creating a risk matrix to outline the threats and vulnerabilities found and determine possible methods to mitigate the identified dangers.

Reference no: EM131024940

Questions Cloud

Prove that the eigenvectors of the transformation t : Prove that the eigenvectors of the transformation T : Complex numbers^2 -> complex numbers^2 given by T ( z , w ) = ( z + aw , w) span on 1-dimensional subspace of complex numbers^2 and give a basis for this subspace.
Write the net neutrality paper : Having read the "Transcending Net Neutrality: Ten Steps Toward an Open Internet" and "SOPA and PIPA What Went Wrong" papers, write the Net Neutrality paper.
What is the corresponding eigenvalue : Suppose that w is an eigenvector of A with eigenvalue β. Find an eigenvector for B which has the same eigenvalue β.
Determine the essential items that you will need to consider : Determine the essential items that you will need to consider prior to the network deployment, and explain the importance of each item in the deployment process.
Evaluate the threat environment of the organization : Evaluate the threat environment of the organization. Analyze the environment in which the organization operates, including the current protocols and policies in place related to information assurance.
Which species predominate at equilibrium reactant or product : Consider the reaction A + B ? C + D. Assume that both the forward reaction and the reverse reaction are elementary processes and that the value of the equilibrium constant is very large. Which species predominate at equilibrium, reactants or produ..
Levitate a conductive object in the magnetic field : Using a levitation coil, you levitate a conductive object in the magnetic field and heat within that field.
Verify the special theorem for the hermitian matrix : Show that for a real symmetric matrix A=A^T, its singular values are exactly the absolute values of its eigenvalues
Create the lorenz butterfly using linearized lorenz equation : The code MUST only use Gauss-Seidel iteration to run the iterations (no RK2 or other methods). The code may not use any built in Matlab functions or solvers or matrices to store answers. It needs to tell how much CPU time was used (incorporate tic..

Reviews

Write a Review

Computer Network Security Questions & Answers

  What descriptive labels might apply to this type of threat

What descriptive labels might apply to this type of threat/incident? What sort of people would go after this information? Why would they want it

  White-hat hackers to breach systems

Go online and search for information about Operation Eligible Receiver. What details can you find? For example, which government systems were infiltrated? How difficult was it for white-hat hackers to breach those systems?

  Define broadband and baseband transmission technology

Define broadband and baseband transmission technology and describe broadband technology and how a broadband system operates.

  Symmetric encryption algorithms

block cipher and a stream cipher, Caesar cipher, cryptanalytic attacks, mono alphabetic cipher and a poly alphabetic cipher, Mix Columns, Add Round key, PGP services, traffic padding, contrast link and end-to-end encryption

  Determine the suitability of certification

Determine the suitability of certification. Justify by using threat identification and provide risk assessment for this organisation.

  Explain why we should not choose primes p and q that are

1 find the primes p and q if n pq 4386607 and phin 4382136.2 explain why we should not choose primes p and q that are

  Difference between a stream cipher and a block cipher

What is your understanding of the difference between a stream cipher and a block cipher?

  Topic is security threats and vulnerabilities

The paper topic is Security Threats and Vulnerabilities it must be written based off of the attached outline it also must be 5-6 pages

  Treats to a companies intellectual property

Day by day threats to a company's intellectual property have grown to an alarming rate over the years. After looking at your network security, structure there are three specific threats that we will focus on that could have a Hughimpact on your bu..

  Write down a class code that outputs a security code the

question 1 write a class called message that prompts the user to enter a message of three words as one string where

  Analyze the characteristics of wireless lans

Analyze the characteristics of wireless LANs

  Social engineering attacks and counterintelligence

Social Engineering Attacks and Counterintelligence

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd