Explain security threats and vulnerabilities

Assignment Help Computer Engineering
Reference no: EM132384677

Assignment: Project 1 Start Here

Vulnerabilities are security holes or flaws that can leave a system open to attack. These may be from an inherent weakness in the system itself, in procedures used, external sources, or anything that may leave information exposed.

It is important that organizations actively assess their vulnerabilities and ways to address them. In this project, you will perform a vulnerability assessment, which identifies, classifies, and ranks the vulnerabilities for your organization from a disaster-management perspective.

The assessment will be completed in a series of steps. You will classify and prioritize threats, assess vulnerabilities, and include a "lessons learned" section as part of the assessment. Your final document will be seven to 10 pages long, not including charts and graphics, and will include appendices, including a vulnerability assessment matrix. Throughout the process, you will be submitting portions of the document to your instructor for feedback so you can make adjustments before submitting the final assessment.

You will be assessed on the coherence, inclusiveness, and feasibility of your findings and recommendations on the vulnerabilities of an organization from a disaster-management perspective.

This is the first of four sequential projects in this course. There are 12 steps in this project. Now that you have an idea of the task ahead, review the scenario next to get started.

Step 1: Classify Aspects to Be Addressed

Step 2: Create a Scope of Work (SoW)

Combine the overview from the previous step with the list of security needs into a one-page SoW report. Submit the report for feedback. In the next step, you will use what you have created to compile a comprehensive project plan.

Step 3: Develop a Comprehensive Work Breakdown Structure (WBS)

Using a excel spreadsheet, create the comprehensive work breakdown structure, including key elements that must be tested and analyzed. Organize the spreadsheet using the elements identified in the SoW from the previous steps and the following:

• internal threats: personnel, policies, procedures

• external threats: systems, connectivity, databases

• existing security measures: software, hardware, telecommunications, cloud resources

• compliance requirements: legal aspects (federal, state, and local), contractual demands up and down the supply chain

• Note the security threats and vulnerabilities. This plan will serve as the second section of the final vulnerability assessment report.

• Submit the comprehensive work breakdown structure for feedback. In the next step, you will provide detailed explanations on those security threats and vulnerabilities.

Step 4: Explain Security Threats and Vulnerabilities

Step 5: Classify the Risk of Threats and Vulnerabilities

Step 6: Prioritize Threats and Vulnerabilities

Compose a two- to three-page report regarding specific threats and vulnerabilities of the technical aspects of the environment. This report will be used in the final vulnerability assessment report.

Submit the threats and vulnerabilities report for feedback. Next, you will take a closer look at network analysis tools.

Step 7: Analyze Network Analysis Tools

Include the findings in a one- to two-page report, including a justification of your decision based on peer-reviewed reference materials cited in APA format. This report will be used in the final vulnerability assessment report.

Step 8: Assess Vulnerabilities

Step 9: Review and Record Findings

Step 10: Write Lessons Learned Report

Submit a two- to three-page report of lessons learned for feedback. Once this reflection is complete, you will be ready to compile the overall vulnerability assessment report. In the next step, you will revise your findings as necessary.

Information related to above question is enclosed below:

Attachment:- Project1.rar

Reference no: EM132384677

Questions Cloud

Describe the difference between a fat ap and a thin ap : In no less than 250 words, describe the difference between a fat AP and a thin AP. What is needed to deploy a thin AP? Are there any security considerations.
Discuss?the need for a request for proposal : Discuss?the need for a Request for Proposal (RFP). When would you need to create a Request for Proposal? No Plagiarism Organization is UPMC.
What is the pv of the costs of operating a series : The cost of capital is 8 percent. What is the PV of the costs of operating a series of such machines in perpetuity?
Create a request for proposal for the cio : Create a 3- to 5-page Request for Proposal (RFP) in Microsoft Word for the CIO, which will minimize procurement related risks for this project.
Explain security threats and vulnerabilities : Vulnerabilities are security holes or flaws that can leave a system open to attack. These may be from an inherent weakness in the system itself, in procedures.
What is the effective annual rate of interest : A loan has a stated annual rate of 13.00%. If loan payments are made monthly and interest is compounded monthly, what is the effective annual rate of interest?
Discussion forum initial post template use the headings : Discussion Forum Initial Post Template Use the headings and fill in your verbiage. Create a goal that aligns with a principle you have identified
Pay for an investment that promises : What is the most that you would pay for an investment that promises to pay $13,868 a year forever with the first payment starting one year from now?
What will the monthly payments be for this car : You would like to purchase a car for $15,656. If the car loan is 04.00% financed over 7 years, what will the monthly payments be for this car?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Will a form of dhcp fault tolerance be implemented

Will a form of DHCP fault tolerance be implemented? How will the second site factor into domain controller placement? How will AD sites be configured?

  How would you choose which might be a better solution

If you have one solution with a problem domain model and a colleague has a different one, can they both be correct? How can you tell if it is a correct model?

  Write a java program that contains a method

The method opens the file specified in the method argument filename and then reads integers from it. This file can contain any number of integers.

  What are the three time stamps maintained in the inode

What are the three time stamps maintained in the inode, and how do you display two of them for the file foo?

  Write python code that will transfer a file reliably

Write python code that will transfer a file reliably between two hosts (a sender and a receiver).

  Write a single statement that assigns num_ones with the num

A cashier distributes change using the maximum number of five dollar bills, followed by one dollar bills.

  Determine the planning horizon

Describe specifically how the organization will formulate a business performance plan, as follows: Determine the planning horizon.

  What types of vulnerabilities need to be addressed

What challenges will need to be addressed with the U.S. Navy project described in your scenario? What types of vulnerabilities need to be addressed.

  Calculate the values you will have to use linear algebra

To calculate the values, you will have to use linear algebra. For that you can use the python library called numpy

  Write a program using a stack abstract datatype

Write a program using a stack abstract datatype to get the correct count for the trees in different parts of the jungle.

  What would be the current values of f and r

If the queue of the previous problem was implemented with an array of capacity N = 30, as described in the chapter. what would be the current values of f and r?

  Write a partial disassembler for MIPS instructions in Java

Computer Architecture- MIPS Disassembler. Your project is to write a partial disassembler for MIPS instructions in Java

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd