Explaining the threat modeling techniques

Assignment Help Computer Engineering
Reference no: EM132239254

Question: Take a look at the attachment. This gives you a visual of Marge's retail store's current IT infrastructure. Marge is looking to enhance her online sales but before she does she has called you to conduct a thorough threat assessment and recommend threat mitigations and controls prior to moving forward with the new project she is calling Using the Internet to Increase Sales.

Write a 3 to 5 page paper with proper APA formatting using the threat modeling techniques we have gone over thus far to uncover any threats that jump out from the attachment. Use critical thinking, look for information flows, exposures, vulnerabilities, and so on. Once you have identified threats suggest mitigations that would reduce the risk of those threats. Also, note that Marge is using a public IP space of 200.200.200.0/24 for the entire network infrastructure i.e. one Local Area Network.

You should at a minimum uncover 5 potential threats within this architecture.

Information related to above question is enclosed below:

Attachment:- MargesRetailStore.rar

Reference no: EM132239254

Questions Cloud

Did you find any of these reasons or causes surprising : The decline in sheep and lamb numbers in the U.S. can be attributed to multiple reasons and causes.
How the different healthcare organizations within community : Discuss how three different healthcare organizations within your community use marketing tools to promote their products and services.
Discuss each component and the specific information : Discuss each component and the specific information that can be included within each section of the policy. Support your paper with five resources.
How internal monitoring and auditing is conducted : How internal monitoring and auditing is conducted. How compliance and practice standards are implemented.
Explaining the threat modeling techniques : Write a 3 to 5 page paper with proper APA formatting using the threat modeling techniques we have gone over thus far to uncover any threats that jump out.
Determine the percentage of ever-smoker males : Determine the percentage of ever-smoker males 65-75 years of age who have undergone CT screening.
Demonstrating a connection to your current work environment : Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.
Explain the associated health problems of obesity epidemic : Explain the associated health problems of the obesity epidemic and eating disorders such as anorexia nervosa, bulimia nervosa, and binge-eating.
Debate about the ending of capital punishment : Analyst staff at the Texas Department of Criminal Justice reporting to senior management about aspects of their operations. A campaign group looking.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Reasons why ids would benefit the company

After reviewing your latest submission, the CIO has found some areas of concern and would like you to provide a little clarity on one subject.

  Compare monoalphabetic and polyalphabetic ciphers

Differentiate block ciphers from stream ciphers and contrast symmetric from asymmetric cryptography. Illustrate with examples.

  Find the lowest five possible frequencies

A signal was acquired at 200 Hz and the spectrum showed a peak at 80 Hz. No anti- Max pts aliasing filter was used.

  Finding domain name available to company

Use the Internet resources in order to determine which domain name is available to company. Judge if you would use a .com, .org, or .net for the Web address.

  Write three pages about dns and how we use dns within a

write three pages about dns and how we use dns within a windows server 2008 environment. in your paper please focus

  Discuss the secure software development concepts

Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups. How does Web 2.0 change security.

  What social engineering is and how it is used

Research Paper- What Social Engineering is, how it is used, and potential positive and negative impacts on individuals and on society?

  Sketch a low power schottky ttl nand circuit

Sketch a low-power Schottky TTL NAND circuit. - What are the primary differences between this circuit and the regular DTL circuit considered earlier in the chapter?

  Write a java program that represents resonant circuit

Write a Java program that represents Resonant Circuit as a superclass and represents the Series Resonant Circuit and Parallel Resonant Circuit as subclasses.

  List functions of system as perceived by an external user

List the functions of the system, as perceived by an external user. List the external entities. Note that because we are modelling the data flows, not use cases, the external entities should be the actual sources and sinks of data rather than the p..

  Is this a good design choice and why

Suppose that new, more powerful arithmetic instruction are added to the instruction set.

  Write an e-mail simulator that processes mail

Write an e-mail simulator that processes mail at an average of 40 messages per minute. As messages are received, they are placed in a queue.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd