Reference no: EM132268270
Question: Throughout this course you will study the different roles that contribute to an organization's information security and assurance.
Part A: Select an organization you wish to explore and use throughout the course.
As you make your selection, keep in mind that you will explore the following roles in the organization: Cyber Security Threat Analyst, Penetration Tester, Cyber Security Engineer, Risk Management Analyst, and Software Engineer. You need sufficient knowledge of the organization you select to complete these security assignments.
Part B: A Cyber Security Threat Analyst conducts analysis, digital forensics, and targeting to identify, monitor, assess, and counter cyber-attack threats against information systems, critical infrastructure, and cyber-related interests.
Take on the role of a Cyber Security Threat Analyst for the organization you select. Use the Threats, Attacks, and Vulnerability Assessment Template to create a 3- to 4-page Assessment Document. The 3-4 page assignment length requirement appplies to the content of the assignment. Start the assignment with an APA formatted title page and add a referenece section with at least two professional references.
Use the references in the text of the assignment.
Research and include the following:
1. Tangible assets:
• Include an assessment scope. The scope must include virtualization, cloud, database, network, mobile, and information system.
2. Asset descriptions:
• Include a system model, A diagram and descriptions of each asset included in the assessment scope, and existing countermeasures already in place. (Microsoft Visio or Lucidchart)
3. Threat agents and possible attacks
4. Exploitable vulnerabilities
5. Threat history
6. Evaluation of threats or impact of threats on the business
7. A prioritized list of identified risks
8. Countermeasures to reduce threat
Information related to above question is enclosed below:
Attachment:- Assessment.rar
Reflection paper - psychology of adjustment and coping
: Need two reflection paper. One about chapter 4 and another one about chapter 5 of the book - The Psychology of adjustment and coping of Erick Millers
|
Describe the characteristics of a successful IG program
: Chapter 3 starts with the identification and the introduction of the Principles, and the characteristics of a successful IG program. Identify these Principles.
|
How corporate governance affects corporate bankruptcy risk
: FIN921 - Managerial Finance Essay Assignment, University of Wollongong, Australia. How the corporate governance affects the corporate bankruptcy risk
|
Review problem on current and emerging technology
: Current And Emerging Technology. We all had the unfortunate experience of seeing how computers can, at times, make life's journey abit more difficult.
|
Evaluation of threats or impact of threats on the business
: CMGT400 As you make your selection, keep in mind that you will explore the following roles in the organization: Cyber Security Threat Analyst.
|
Conduct an in-depth industry analysis
: Identify relationships between sectors within an economy - impact the Singapore economy in general - Economic Impact Assessment of the Tasmanian Aquaculture
|
Discussion about the artificial intelligence
: Pick and select one of the following research areas: Cloud Computing (Intranet, Extranet, and Internet), Machine Learning, Artificial Intelligence.
|
Discussion and evaluation of the conflicting results
: IST8101 Masters of Science in Information Systems Technology. Discussion paper must include: A discussion and evaluation of the conflicting results.
|
Analysis of the issue from a modernization
: POLS 481: The politics of developing countries- you are open as to which issue you choose to present on but the issue must be directly related to development.
|