Why are these threats more common and why are they important

Assignment Help Computer Engineering
Reference no: EM133498709

Case Scenario: Adventure Scuba and Diving Institute (ASDI) is located in the United States and offers training and certification programs for scuba and deep-sea diving. ASDI is a premier training school in the area of diving and scuba and has developed a wealth of proprietary training resources, videos, guides and manuals. The school suspects that competitors have tried to breach the organization's computer systems to gain access to these training materials.

ASDI's network is comprised of two web servers, two file servers, one email server, 50 employee workstations, and a 50-workstation student computer lab. The school also has public and private Wi-Fi availability throughout the campus.

Your firm has been hired as the IT security analyst to review, evaluate, and make recommendations with respect to maintenance of security of the organization's computer and network systems. You have been charged by your supervisor to prepare a preliminary report documenting the most critical security threats that ASDI faces. Your supervisor has given you the following resources that might be useful in your research and analysis:

An article on the Help Net Security websiteLinks to an external site.

Common Vulnerabilities and Exposure (CVE) database searchLinks to an external site.

Security organizations, such as SecuniaLinks to an external site.

  • Your supervisor has asked you to consider and account for the following questions as you shortlist the threats and prepare your report:
  • What threats are new this year and which have become more prevalent?

Question 1: Why are these threats more common and why are they important?

Question 2: What threats remain constant from year to year? Why?

Question 3: What threats do you believe will become more critical in the next 12 months? Why?

Question 4: Has an exploit been released?

  • What is the likelihood of an exploit?

Question 5: How widely used is the software or system?

Reference no: EM133498709

Questions Cloud

Explaining the goal of a labor relations system is : Explaining the goal of a labor relations system is to balance efficiency, equity, and voice, what value it adds to your career goals, and how you intend
Reflect on your experiences in the workforce : Discuss that topic, explaining why you selected it, what value it adds to your career goals, and how you intend to incorporate what you have learned into your
Research the most common nosocomial infections : Research the most common nosocomial infections and the associated costs to treat them, and identify the website used.
Define job performance and criteria : Define job performance and criteria. Why is it important to understand job performance and criteria as part of the recruitment and selection process
Why are these threats more common and why are they important : Why are these threats more common and why are they important? - What threats remain constant from year to year? Why?
Tell me a time when an associate had to quickly adapt : tell me a time when an associate had to quickly adapt to changing priorities?
What degree has the study of race and ethnicity : What degree has the study of race and ethnicity and the inclusion of non-White groups and individuals been made visible?
Difference between quantitative and qualitative rqs : Explain the difference between quantitative and qualitative RQs. Reference the exemplars to support your explanation.
Explain how it will help to achieve the learning objective : Explain how it will help to achieve the learning objective and Apply the principles of Engagement, Representation and Action discussed in the UDL

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd