Take on the role of a cyber security threat analyst

Assignment Help Management Information Sys
Reference no: EM132294063

Part A:

Select an organization you wish to explore and use throughout the course.

As you make your selection, keep in mind that you will explore the following roles in the organization: Cyber Security Threat Analyst, Penetration Tester, Cyber Security Engineer, Risk Management Analyst, and Software Engineer. You need sufficient knowledge of the organization you select to complete these security assignments.

Part B:

A Cyber Security Threat Analyst conducts analysis, digital forensics, and targeting to identify, monitor, assess, and counter cyber-attack threats against information systems, critical infrastructure, and cyber-related interests.

Take on the role of a Cyber Security Threat Analyst for the organization you select. Use the Threats, Attacks, and Vulnerability Assessment Template to create a 3- to 4-page Assessment Document.

Research and include the following:

Tangible assets:

Include an assessment scope. The scope must include virtualization, cloud, database, network, mobile, and information system.

Asset descriptions:

Include a system model, A diagram and descriptions of each asset included in the assessment scope, and existing countermeasures already in place.

Threat agents and possible attacks

Exploitable vulnerabilities

Threat history

Evaluation of threats or impact of threats on the business

A prioritized list of identified risks

Countermeasures to reduce threat

Reference no: EM132294063

Questions Cloud

Describe a high-level timeline that includes key tasks : Estimate the project's overall cost and any key staffing and non-staffing resources needed.
Describe a hypothetical situation : Provide a real-world example or describe a hypothetical situation in which a legitimate organization used spam in an effective and nonintrusive manner.
Describe agile project management : Provide a brief summary of your project. Describe at least three (3) key milestones and/or deliverables for your project.
What has this course prepared you for : What has this course prepared you for? Has your awareness of physical security increased? if so, how
Take on the role of a cyber security threat analyst : A Cyber Security Threat Analyst conducts analysis, digital forensics, and targeting to identify, monitor, assess, and counter cyber-attack.
Uml diagrams to illustrate the system architecture : MN611 - System Architecture - Melbourne Institute of technology - UML diagrams to illustrate the system architecture - Analyse and model system functionality
Create a data flow diagram relating the tables : Illustrate the flow of data including both inputs and outputs for the use of a data warehouse. The diagram must map data between source systems.
What are the important things for vulture skims to have : And explain how does Voucher schemes help the H&M to increase customer engagement is through Voucher schemes?
How will the electronic medical record hinder the delivery : How will the electronic medical record (EMR)/electronic health record (EHR) help or hinder the delivery of health care?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Why is knowledge management particularly important

Why is knowledge management particularly important to a company that wants to become a learning organization?

  Describe the advantages of atm to those of frame relay

Compare the advantages and disadvantages of ATM to those of frame relay. Recommend the superior technology and explain your rationale.

  Define how would you implement the different types of glass

You are the Executive Safety Officer (ESO) and was tasked to ensure that the facility is secure. In this assignment discuss "How does the different types.

  Why is software quality assurance important in system

What are some of the software quality assurance methods that you would embrace for ensuring quality in the application that you are developing, and why?

  Identify an emerging technology in your field of choice

Identify social media strategies that the university can use to achieve its objectives: Provide a description on how each strategy can be utilized by the university. Illustrate advantages and disadvantages of each strategy.

  Describe an array and its various implementations

Respond to the following about arrays and their implementations: Describe an array and its various implementations

  Determine which cpu of the two is faster and why

From the first e-Activity, identify the following CPUs: 1) the CPU that resides on a computer that you own or a computer that you would consider purchasing, and 2) the CPU of one (1) other computer. Compare the instruction sets and clock rates of ..

  Analyze why the burden on managers is greater today

Analyze why the burden on managers is greater today than in previous years when it comes to using technology efficiently. Give two examples that defend this claim

  Discuss at least two benefits to structuring arguments

Discuss at least two benefits to structuring arguments before and while developing written documents - Highlight at least two concepts or skills of public policy analysis

  Provide your opinion on the agile coachs role in this case

Analyze the manner in which the project teams and coaches master the agile methodology to solve business problems.

  Outline a risk mitigation strategy for the each of the risks

Each member selects one of the highest risks. Explain why these are considered high risk, and explain their potential effect on the project. Outline a risk mitigation strategy for the each of the selected high risks.

  Explain security mechanisms needed to protect the dms system

Explain the security mechanisms needed to protect the DMS systems from both state employees and users accessing over the Internet.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd