Explain security threats and vulnerabilities

Assignment Help Computer Engineering
Reference no: EM132384677

Assignment: Project 1 Start Here

Vulnerabilities are security holes or flaws that can leave a system open to attack. These may be from an inherent weakness in the system itself, in procedures used, external sources, or anything that may leave information exposed.

It is important that organizations actively assess their vulnerabilities and ways to address them. In this project, you will perform a vulnerability assessment, which identifies, classifies, and ranks the vulnerabilities for your organization from a disaster-management perspective.

The assessment will be completed in a series of steps. You will classify and prioritize threats, assess vulnerabilities, and include a "lessons learned" section as part of the assessment. Your final document will be seven to 10 pages long, not including charts and graphics, and will include appendices, including a vulnerability assessment matrix. Throughout the process, you will be submitting portions of the document to your instructor for feedback so you can make adjustments before submitting the final assessment.

You will be assessed on the coherence, inclusiveness, and feasibility of your findings and recommendations on the vulnerabilities of an organization from a disaster-management perspective.

This is the first of four sequential projects in this course. There are 12 steps in this project. Now that you have an idea of the task ahead, review the scenario next to get started.

Step 1: Classify Aspects to Be Addressed

Step 2: Create a Scope of Work (SoW)

Combine the overview from the previous step with the list of security needs into a one-page SoW report. Submit the report for feedback. In the next step, you will use what you have created to compile a comprehensive project plan.

Step 3: Develop a Comprehensive Work Breakdown Structure (WBS)

Using a excel spreadsheet, create the comprehensive work breakdown structure, including key elements that must be tested and analyzed. Organize the spreadsheet using the elements identified in the SoW from the previous steps and the following:

• internal threats: personnel, policies, procedures

• external threats: systems, connectivity, databases

• existing security measures: software, hardware, telecommunications, cloud resources

• compliance requirements: legal aspects (federal, state, and local), contractual demands up and down the supply chain

• Note the security threats and vulnerabilities. This plan will serve as the second section of the final vulnerability assessment report.

• Submit the comprehensive work breakdown structure for feedback. In the next step, you will provide detailed explanations on those security threats and vulnerabilities.

Step 4: Explain Security Threats and Vulnerabilities

Step 5: Classify the Risk of Threats and Vulnerabilities

Step 6: Prioritize Threats and Vulnerabilities

Compose a two- to three-page report regarding specific threats and vulnerabilities of the technical aspects of the environment. This report will be used in the final vulnerability assessment report.

Submit the threats and vulnerabilities report for feedback. Next, you will take a closer look at network analysis tools.

Step 7: Analyze Network Analysis Tools

Include the findings in a one- to two-page report, including a justification of your decision based on peer-reviewed reference materials cited in APA format. This report will be used in the final vulnerability assessment report.

Step 8: Assess Vulnerabilities

Step 9: Review and Record Findings

Step 10: Write Lessons Learned Report

Submit a two- to three-page report of lessons learned for feedback. Once this reflection is complete, you will be ready to compile the overall vulnerability assessment report. In the next step, you will revise your findings as necessary.

Information related to above question is enclosed below:

Attachment:- Project1.rar

Reference no: EM132384677

Questions Cloud

Describe the difference between a fat ap and a thin ap : In no less than 250 words, describe the difference between a fat AP and a thin AP. What is needed to deploy a thin AP? Are there any security considerations.
Discuss?the need for a request for proposal : Discuss?the need for a Request for Proposal (RFP). When would you need to create a Request for Proposal? No Plagiarism Organization is UPMC.
What is the pv of the costs of operating a series : The cost of capital is 8 percent. What is the PV of the costs of operating a series of such machines in perpetuity?
Create a request for proposal for the cio : Create a 3- to 5-page Request for Proposal (RFP) in Microsoft Word for the CIO, which will minimize procurement related risks for this project.
Explain security threats and vulnerabilities : Vulnerabilities are security holes or flaws that can leave a system open to attack. These may be from an inherent weakness in the system itself, in procedures.
What is the effective annual rate of interest : A loan has a stated annual rate of 13.00%. If loan payments are made monthly and interest is compounded monthly, what is the effective annual rate of interest?
Discussion forum initial post template use the headings : Discussion Forum Initial Post Template Use the headings and fill in your verbiage. Create a goal that aligns with a principle you have identified
Pay for an investment that promises : What is the most that you would pay for an investment that promises to pay $13,868 a year forever with the first payment starting one year from now?
What will the monthly payments be for this car : You would like to purchase a car for $15,656. If the car loan is 04.00% financed over 7 years, what will the monthly payments be for this car?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd