Create a report on the threat scope

Assignment Help Computer Network Security
Reference no: EM13721068

Your task is to create a report on the threat scope against a specific target. There are three profiles for these threats, of which you choose one.

The three profiles are:

1) Policy Profile: You are the Chief Information Security Officer (CISO) for a large multinational enterprise with a very large collection of intellectual property that represents a major portion of your business' holdings. What are the threats against your corporate network, where do they come from and what do you need to mitigate against them? Keep in mind that, as a CISO, you are more interested in developing Policy and Procedure than day to day threat management.

2) Response Profile: You are a threat researcher for a Computer Emergency Response Team (CERT) that is responsible for protecting Government networks. The Government will be releasing an unpopular policy in the near future and is expecting attacks from "hacktivists". What are the sorts of cyber-attacks that can be expected? How can the agency organise itself now to help reduce the impact of those cyber-threats? Remember that Government agencies often have lots of partners and social media accounts.

3) Technical Level:You are a penetration tester providing services to a client (i.e. not the company you work for), who is a major national accounting firm. Identify the risks to your company in performing the penetration test, identify the standard framework for conducting a penetration test and the methods that you would employ to conduct the test.

Your assignment is to choose one of those profiles, and write a report that is at least 3000 words or 15 pages (whichever is longer). Your assignment should cover the above brief for your profile, and to also cover the following aspects:

- What are the countermeasures to those threats, and how do they fit within the Situational Crime Prevention framework?

- How does the current law help or hinder your countermeasures? Are there any proposals for laws that would assist?

- Is your problem of international scope and, if so, how?

Reference no: EM13721068

Questions Cloud

Nike csr challenge : In this assignment, you will analyze a strategic management case. This practice is a great way to understand and remember many strategic management concepts. You will read how others have applied strategic management and share your analysis of the..
Tierney enterprises is constructing its cash budget : Tierney Enterprises is constructing its cash budget. Its budgeted monthly sales are $5,000, and they are constant from month to month. 40% of its customers pay in the first month and take the 2% discount, while the remaining 60% pay in the mont..
Corporations often use different costs of capital : Corporations often use different costs of capital for different operating divisions. Using an example, calculate the weighted cost of capital (WACC). What are some potential issues in using varying techniques for cost of capital for different d..
Advanced technologies used for solar power generation : The advanced technologies used for solar power generation
Create a report on the threat scope : What are the counter measures to those threats, and how do they fit within the Situational Crime Prevention framework and how does the current law help or hinder your countermeasures? Are there any proposals for laws that would assist?
Large-scale database are available on several platforms : Large-scale database are available on several platforms. Among those are MySQL, SQL Server, and Oracle. Other than cost, why might an organization select MySQL over SQL Server or Oracle? If cost is not a consideration, is there an obvious d..
Prepare a career research report : You are required to research three specific fields of employment in your discipline that you are interested in pursuing a career in.
No problem can withstand the assault of sustained thinking. : When faced with a problem, what do you do to solve it? This assignment asks you to apply a six-step to problem solving process to a specific problem scenario. You will write a paper that presents a synthesis of your ideas about solving the prob..
Define a psychological contract : Define a psychological contract and describe the one that you made by entering college. What are your contributions, and what are the school's inducements?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Use a two-stage transposition technique to encrypt

Use a two-stage transposition technique to encrypt the following message using the key "Decrypt". Ignore the comma and the period in the message

  Desktop publishing system

Consider a desktop publishing system used to produce documents for various organizations. a. Give an example of a type of publication for which confidentiality of the stored data is the most important requirement

  The network administrator to protect the network against

over the past several years the chief executive officer of your company has read articles on internet control message

  Expected time to find all users passwords

Assume that eight more characters were added to the password and that the DES algorithm was changed so as to use all 16 password characters. What would be the expected time to find all users' passwords using a dictionary attack?

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Describe and discuss the potential impact of recommendations

International politics are intermingled and cybersecurity issues carry political risks to impact the influences and outcomes on other political issues.

  Question about program consistency

Please provide an example of a event where consistency has caused too many problems? Is there a program you have used in your own work environment where consistency has caused problems?

  Analyze the fundamentals of pki

Analyze the fundamentals of PKI, and determine the primary ways in which its features and functions could benefit your organization and its information security department.

  What is the ciphertext generated by encryption of character

What is the ciphertext (in binary form) generated by the encryption of character D? How is plaintext for this encrypted D recovered?

  Compare and contrast the difference between legislation and

cyber security power point presentation using the information you learned from modules 1 and 2 create a powerpoint

  Boot process for a windows machine

What is the boot process for a Windows machine switches through several different modes. What are they, and how do they impact security?

  How to set up or improve their cybersecurity

How should government justify telling private industry how to set up or improve their cybersecurity?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd