Identify the emerging threats and mitigation strategies

Assignment Help Other Subject
Reference no: EM132094636

Identify emerging threats and mitigation strategies in Information Systems

Purpose of the assessment (with ULO Mapping)

The purpose of the assignment is to identify the emerging threats and mitigation strategies in Information Systems. Students will be able to complete the following ULOs:

b. Identify common emerging threats, attacks, mitigation and countermeasures in networked information systems

Assignment Description

Objective of this assessment is to identify common emerging threats and attacks, and suggest appropriate mitigation and countermeasures strategies for networked information systems.

Scenario

You are the principal Security Architect for Mindvision Corporation, a firm with four regional offices and 50 employees located across Australia. The corporation has detected an ongoing cyber-attacks from last few days effecting their network and day-to-day operational services. Your role (based on the chosen topic below) is to liaise between business stakeholders and technologists. Translating potential emerging threats and attacks faced by Corporation and providing feasible countermeasures so corporation can take security decisions more effectively.

Your deliverable for this assessment is to write a report for any ONE of the following topics:

- IP security
- Secure remote access
- Network devices security
- Cloud computing
- Intrusion prevention system
- Firewall security
- DDoS attack detection and prevention

The report must address the following criteria:

- An Executive Summary at the beginning of the report which provides a clear statement of the emerging threats and attacks being assessed.
- Identify and explain emerging threats based on vulnerabilities and consequences derived from Networked Information Systems.
- Discuss potential damages these threats and vulnerabilities could cause if exploited.
- What are the challenges and issues faced by corporation to control these threats?
- Discuss the impact of financial difficulties and budget constraints while selecting security countermeasures.
- Provide detail mitigation and countermeasure strategies that will impact the networked information system.

Verified Expert

This paper is about common emerging threats, attacks, mitigation and countermeasures in networked information systems. Potential damages these threats and vulnerabilities could cause if exploited. Challenges and issues faced by corporation to control these threats, the impact of financial difficulties and budget constraints while selecting security countermeasures and detail mitigation and countermeasure strategies that will impact the networked information system are also included in this paper.

Reference no: EM132094636

Questions Cloud

What are the initial margin and maintenance margin : What are the initial margin and maintenance margin on your margin account? Fill the appropriate numbers in the blank cells in the following table.
Explaining some of the common symptoms : Prepare a presentation for John and Michael, explaining some of the common symptoms/problems of supply chain management.
As healthcare organizations move forward to the future : As healthcare organizations move forward to the future, how healthcare is delivered in the United States will continue to be scrutinized.
What is the problem your business is solving : Please write a one-page paper reflecting on your innovative, new business idea for the individual Rocket Marketing Pitch project and place
Identify the emerging threats and mitigation strategies : BN203 - Network Security - Identify common emerging threats, attacks, mitigation and countermeasures in networked information systems
Final assignment mis : After finishing your studies at EU, you and 2 partners decided to create a business. Since then it has grown both in turnover
Video awkward performance review : Watch the video clips below on delivering bad news. Based on what you learned, what concepts could have been leveraged and how could these messages
Sustainable competitive advantage : How does (Uber) competitive strength compare against that that of (blockbuster)? Do a weighted competitive strength assessment
How the federal reserve and its monetary policy affect : Recommend one (1) strategy for maximizing return for the current risk return relationship identified for each of the three (3) securities.

Reviews

inf2094636

12/7/2018 10:21:27 PM

Good quick response to any of the my query. Looks good quality and the expert reads the case and provided a proper response instead of rushing despite needed it after 5 hours of asking for help. Instructions were followed correctly, the assignment is prepared correctly too! Cool.

len2094636

8/23/2018 11:54:54 PM

Summary/Concl usion /5 All elements are present and very well integrated. Conclusive present with good cohesive Components present and mostly well Most components present but Conclusion lacks relevance integrated not well summarized Reference style /5 Clear styles with excellent source Clear referencing Generally good Sometimes clear Lacks consistency with many errors of references. style referencing referencing style style

len2094636

8/23/2018 11:54:48 PM

Potential damages /10 In depth use of a good range of relevant literature to address the points. Evidence of using relevant literature to address the points. Use of some relevant literature to address the points. Limited evidence of using relevant literature to address the point No evidence and literature to address points as required. Challenges /Issues /10 Logic is clear and easy to follow with strong arguments Consistency logical and convincing Mostly consistent logical and convincing Adequate cohesion and conviction Argument is confused and disjointed Mitigation and countermeasure strategies /5 Thorough and comprehensive explanation of the solutions, to Good explanation of the solutions to the problem Enough explanation of the solution to Limited explanation to the solution of the problem No explanation for mitigation provided or discussed the problem defined the problem defined. defined. defined

len2094636

8/23/2018 11:54:39 PM

Grade Mark HD 40-50 DI 35-39 CR 30-34 P 25-29 Fail <25 Excellent Very Good Good Satisfactory Unsatisfactory Executive Summary is relevant and soundly analyzed. Generally relevant and analyzed. Some relevance and briefly presented. This is not relevant to the assignment topic. Summary Concise and /5 specific to the topic Identification of threats and attacks /10 Demonstrated excellent ability to think critically and sourced Demonstrated excellent ability to think critically but Demonstrat ed ability to think critically and sourced reference material appropriate ly Demonstrate d ability to think critically and did not source reference material appropriately Did not demonstrate ability to think critically and did reference did not source not source material reference reference material appropriately for material appropriately identification of appropriately threats

len2094636

8/23/2018 11:54:30 PM

Identification of threats and attacks Student should identify and discuss in detail relevant security threats and attacks for the selected topic 10 Potential damages Student should list down and explain potential damages these threats could cause if exploited 10 Challenges/Issues Student should identify and relate challenges/issues faced by corporation to control these threats such as financial difficulties and budget constraints. 10 Mitigation and countermeasure strategies Student should discuss mitigation and countermeasure strategies relevant to threats identified in earlier part of this report 5 Summary/Conclusion Student should conclude how these threats and mitigation strategies is going to impact the networked information systems 5 Reference style Follow IEEE reference style 5 Total 50

len2094636

8/23/2018 11:54:23 PM

All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. Marking criteria: Example of marking criteria is shown in following table. Marks are allocated as follows: Section to be included in the report Description of the section Marks Executive Summary Student should describe purpose of report and statement of threats and attacks being discussed in report. 5

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd