Reference no: EM132384677
Assignment: Project 1 Start Here
Vulnerabilities are security holes or flaws that can leave a system open to attack. These may be from an inherent weakness in the system itself, in procedures used, external sources, or anything that may leave information exposed.
It is important that organizations actively assess their vulnerabilities and ways to address them. In this project, you will perform a vulnerability assessment, which identifies, classifies, and ranks the vulnerabilities for your organization from a disaster-management perspective.
The assessment will be completed in a series of steps. You will classify and prioritize threats, assess vulnerabilities, and include a "lessons learned" section as part of the assessment. Your final document will be seven to 10 pages long, not including charts and graphics, and will include appendices, including a vulnerability assessment matrix. Throughout the process, you will be submitting portions of the document to your instructor for feedback so you can make adjustments before submitting the final assessment.
You will be assessed on the coherence, inclusiveness, and feasibility of your findings and recommendations on the vulnerabilities of an organization from a disaster-management perspective.
This is the first of four sequential projects in this course. There are 12 steps in this project. Now that you have an idea of the task ahead, review the scenario next to get started.
Step 1: Classify Aspects to Be Addressed
Step 2: Create a Scope of Work (SoW)
Combine the overview from the previous step with the list of security needs into a one-page SoW report. Submit the report for feedback. In the next step, you will use what you have created to compile a comprehensive project plan.
Step 3: Develop a Comprehensive Work Breakdown Structure (WBS)
Using a excel spreadsheet, create the comprehensive work breakdown structure, including key elements that must be tested and analyzed. Organize the spreadsheet using the elements identified in the SoW from the previous steps and the following:
• internal threats: personnel, policies, procedures
• external threats: systems, connectivity, databases
• existing security measures: software, hardware, telecommunications, cloud resources
• compliance requirements: legal aspects (federal, state, and local), contractual demands up and down the supply chain
• Note the security threats and vulnerabilities. This plan will serve as the second section of the final vulnerability assessment report.
• Submit the comprehensive work breakdown structure for feedback. In the next step, you will provide detailed explanations on those security threats and vulnerabilities.
Step 4: Explain Security Threats and Vulnerabilities
Step 5: Classify the Risk of Threats and Vulnerabilities
Step 6: Prioritize Threats and Vulnerabilities
Compose a two- to three-page report regarding specific threats and vulnerabilities of the technical aspects of the environment. This report will be used in the final vulnerability assessment report.
Submit the threats and vulnerabilities report for feedback. Next, you will take a closer look at network analysis tools.
Step 7: Analyze Network Analysis Tools
Include the findings in a one- to two-page report, including a justification of your decision based on peer-reviewed reference materials cited in APA format. This report will be used in the final vulnerability assessment report.
Step 8: Assess Vulnerabilities
Step 9: Review and Record Findings
Step 10: Write Lessons Learned Report
Submit a two- to three-page report of lessons learned for feedback. Once this reflection is complete, you will be ready to compile the overall vulnerability assessment report. In the next step, you will revise your findings as necessary.
Information related to above question is enclosed below:
Attachment:- Project1.rar