Identify the emerging threats and mitigation strategies

Assignment Help Other Subject
Reference no: EM132094636

Identify emerging threats and mitigation strategies in Information Systems

Purpose of the assessment (with ULO Mapping)

The purpose of the assignment is to identify the emerging threats and mitigation strategies in Information Systems. Students will be able to complete the following ULOs:

b. Identify common emerging threats, attacks, mitigation and countermeasures in networked information systems

Assignment Description

Objective of this assessment is to identify common emerging threats and attacks, and suggest appropriate mitigation and countermeasures strategies for networked information systems.

Scenario

You are the principal Security Architect for Mindvision Corporation, a firm with four regional offices and 50 employees located across Australia. The corporation has detected an ongoing cyber-attacks from last few days effecting their network and day-to-day operational services. Your role (based on the chosen topic below) is to liaise between business stakeholders and technologists. Translating potential emerging threats and attacks faced by Corporation and providing feasible countermeasures so corporation can take security decisions more effectively.

Your deliverable for this assessment is to write a report for any ONE of the following topics:

- IP security
- Secure remote access
- Network devices security
- Cloud computing
- Intrusion prevention system
- Firewall security
- DDoS attack detection and prevention

The report must address the following criteria:

- An Executive Summary at the beginning of the report which provides a clear statement of the emerging threats and attacks being assessed.
- Identify and explain emerging threats based on vulnerabilities and consequences derived from Networked Information Systems.
- Discuss potential damages these threats and vulnerabilities could cause if exploited.
- What are the challenges and issues faced by corporation to control these threats?
- Discuss the impact of financial difficulties and budget constraints while selecting security countermeasures.
- Provide detail mitigation and countermeasure strategies that will impact the networked information system.

Verified Expert

This paper is about common emerging threats, attacks, mitigation and countermeasures in networked information systems. Potential damages these threats and vulnerabilities could cause if exploited. Challenges and issues faced by corporation to control these threats, the impact of financial difficulties and budget constraints while selecting security countermeasures and detail mitigation and countermeasure strategies that will impact the networked information system are also included in this paper.

Reference no: EM132094636

Questions Cloud

What are the initial margin and maintenance margin : What are the initial margin and maintenance margin on your margin account? Fill the appropriate numbers in the blank cells in the following table.
Explaining some of the common symptoms : Prepare a presentation for John and Michael, explaining some of the common symptoms/problems of supply chain management.
As healthcare organizations move forward to the future : As healthcare organizations move forward to the future, how healthcare is delivered in the United States will continue to be scrutinized.
What is the problem your business is solving : Please write a one-page paper reflecting on your innovative, new business idea for the individual Rocket Marketing Pitch project and place
Identify the emerging threats and mitigation strategies : BN203 - Network Security - Identify common emerging threats, attacks, mitigation and countermeasures in networked information systems
Final assignment mis : After finishing your studies at EU, you and 2 partners decided to create a business. Since then it has grown both in turnover
Video awkward performance review : Watch the video clips below on delivering bad news. Based on what you learned, what concepts could have been leveraged and how could these messages
Sustainable competitive advantage : How does (Uber) competitive strength compare against that that of (blockbuster)? Do a weighted competitive strength assessment
How the federal reserve and its monetary policy affect : Recommend one (1) strategy for maximizing return for the current risk return relationship identified for each of the three (3) securities.

Reviews

inf2094636

12/7/2018 10:21:27 PM

Good quick response to any of the my query. Looks good quality and the expert reads the case and provided a proper response instead of rushing despite needed it after 5 hours of asking for help. Instructions were followed correctly, the assignment is prepared correctly too! Cool.

len2094636

8/23/2018 11:54:54 PM

Summary/Concl usion /5 All elements are present and very well integrated. Conclusive present with good cohesive Components present and mostly well Most components present but Conclusion lacks relevance integrated not well summarized Reference style /5 Clear styles with excellent source Clear referencing Generally good Sometimes clear Lacks consistency with many errors of references. style referencing referencing style style

len2094636

8/23/2018 11:54:48 PM

Potential damages /10 In depth use of a good range of relevant literature to address the points. Evidence of using relevant literature to address the points. Use of some relevant literature to address the points. Limited evidence of using relevant literature to address the point No evidence and literature to address points as required. Challenges /Issues /10 Logic is clear and easy to follow with strong arguments Consistency logical and convincing Mostly consistent logical and convincing Adequate cohesion and conviction Argument is confused and disjointed Mitigation and countermeasure strategies /5 Thorough and comprehensive explanation of the solutions, to Good explanation of the solutions to the problem Enough explanation of the solution to Limited explanation to the solution of the problem No explanation for mitigation provided or discussed the problem defined the problem defined. defined. defined

len2094636

8/23/2018 11:54:39 PM

Grade Mark HD 40-50 DI 35-39 CR 30-34 P 25-29 Fail <25 Excellent Very Good Good Satisfactory Unsatisfactory Executive Summary is relevant and soundly analyzed. Generally relevant and analyzed. Some relevance and briefly presented. This is not relevant to the assignment topic. Summary Concise and /5 specific to the topic Identification of threats and attacks /10 Demonstrated excellent ability to think critically and sourced Demonstrated excellent ability to think critically but Demonstrat ed ability to think critically and sourced reference material appropriate ly Demonstrate d ability to think critically and did not source reference material appropriately Did not demonstrate ability to think critically and did reference did not source not source material reference reference material appropriately for material appropriately identification of appropriately threats

len2094636

8/23/2018 11:54:30 PM

Identification of threats and attacks Student should identify and discuss in detail relevant security threats and attacks for the selected topic 10 Potential damages Student should list down and explain potential damages these threats could cause if exploited 10 Challenges/Issues Student should identify and relate challenges/issues faced by corporation to control these threats such as financial difficulties and budget constraints. 10 Mitigation and countermeasure strategies Student should discuss mitigation and countermeasure strategies relevant to threats identified in earlier part of this report 5 Summary/Conclusion Student should conclude how these threats and mitigation strategies is going to impact the networked information systems 5 Reference style Follow IEEE reference style 5 Total 50

len2094636

8/23/2018 11:54:23 PM

All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. Marking criteria: Example of marking criteria is shown in following table. Marks are allocated as follows: Section to be included in the report Description of the section Marks Executive Summary Student should describe purpose of report and statement of threats and attacks being discussed in report. 5

Write a Review

Other Subject Questions & Answers

  Describe some of characteristics of well-designed storyboard

Describe some of the characteristics of a well-designed storyboard. Predict the impact that a poorly developed storyboard could have on a Website.

  Radical congressional reconstruction of the south ended

Radical congressional Reconstruction of the South ended when

  Emotional aspect

Is the emotional aspect (e.g. sharing, support) of love in Sternberg’s trian  gular theory of love.

  Question regarding the specific aspects roman

Roman architecture was both inventive and derivative. How is the Roman temple related to both Greek and Etruscan designs? What specific aspects are uniquely Roman?

  What are the rationales for the total quality approach

What are the rationales for the total quality approach to doing business?

  Is there evidence that the mean first marriage age has

Assume that the mean age at first marriage among females in in 2003 was 27 yrs old. A random sample of 144 females this year yielded a mean first marriage age of 29.5 with a standard deviation of 4 years. Assume that marriage ages were normally distr..

  Identify what the advancement was and how it functions

Identify what the "advancement" was/is and how it functions in terms of what we have covered in lectures and discussions in this course; what is its impact;

  Why your plan will make the event a success

You are hosting an important event on campus, the RSVP's are in and there will be 100 guests (not fellow students) attending.

  Integrate what you have learned into one comprehensive

integrate what you have learned into one comprehensive plan for raising geometry and measurement achievement in your

  Membership in gang and history of drug abuse

Does a person bear some of the responsibility for his orher victimization if the person has a lifestyle (e.g., membership in gang, history of drug abuse, etc.) that contributes to the chances of becoming avictim of crime? Is it fair and reasonable to..

  Either sample or the sum of squares.

The question doesn't give you the mean for either sample or the sum of squares. I figured out how to get the mean for Sample 1 and Sample 2, but how do you find the SS?

  How a sales team would determine which customers to take

During busy times of the year, a hotel, convention center, or meeting hall may have more demand than meeting space available.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd