Describe how the fundamental concepts of cyber defense

Assignment Help Other Subject
Reference no: EM132194080

Project

OVERVIEW

A risk assessment is a process for identifying and evaluating risk. It is a key activity in a cost-effective and balanced approach to managing risk for systems. The first step in a risk assessment is identifying the critical assets for the organization. It is not possible to protect the items most valuable to the organization if they are not identified as such. Once assets are identified, then the scope of the risk assessment must be determined.

A vulnerability scan is conducted for the network. The results of the vulnerability scan are used to identify holes in the security posture. These results can be rated as critical, high, medium, and low and addressed accordingly with critical and high results being much more important to address soonest. For this assignment, you will create a risk assessment based on themes discussed in this course. The main purpose of this final project is to tie the concept of risk to a holistic perspective of the organization's processes.

INSTRUCTIONS

Based on the ABC Company system scenario, your final project must contain a summary of all critical, high, and medium findings; a recommendation for remediation of those findings; and any suggestions for improvement to the network layout for the organization. This assignment requires a 3- to 5-page Risk Assessment Report (template provided) in APA format, along with an additional references page. See below for details.

1. A vulnerability scan, based on a Nessus scan, is part of this assignment (results provided). Note:Actual hostnames and IP addresses were removed from this scan for security purposes. However, in a "real" scan result, this information would be included. Analyze the results of the scan to identify the critical, high, and medium findings relevant to the scope of your assessment. Keep in mind what would be the most important assets for ABC Company.

2. After identifying relevant findings from the vulnerability scan in step 1, analyze the network diagram for ABC Company (below) and provide recommendations to ABC Company on how to improve their security posture.

3. Complete a risk assessment using the risk assessment report template to include the following:
a. Complete all applicable sections, as explained in the instructions portion of the template.
b. Identify assets and threats in Sections 1.3 and 1.4 of the template.
c. Identify vulnerabilities in the network design and vulnerabilities in the scan results in Section 1.5 of the template.
d. Complete a risk analysis in Section 1.6 of the template.

4. Provide recommendations in Section 2 of the template including:
a. Corrective actions and estimated timetables for fixes
b. Estimated residual risk to ABC Company
c. A future plan (rescan on a specific periodic basis, re-run risk assessments annually, etc.).

Submit the final project (risk assessment report) to your mentor for grading. Consult the Course Calendar for due dates.

This assignment corresponds to or addresses the following Cybersecurity Program outcomes for the bachelor of science degree:

• Students assess and apply cybersecurity principles, tools, and methods to defend information systems against cyber threats. [BSCS1 1]
• Students apply cybersecurity design best practices and technologies to prevent and mitigate cyberattacks and vulnerabilities. [BSCS1 2]
• Students design, implement, and administer networks in a secure manner by integrating network defense technologies, monitoring tools, and measures. [BSCS1 3]

Your work on this assignment should reflect your ability to:

• Describe how the fundamental concepts of cyber defense can be used to provide system security. (Concepts of cyber defense)
• Describe cyber defense tools, methods, and components. (Cyber defense tools, methods, and components)
• Examine the architecture of a particular system and identify significant vulnerabilities, risks, and points at which specific security technologies/methods should be employed. (System architecture)
• Show usage of a network monitoring tool. (Uses of network monitoring tools)
• Describe concepts of network defense. (Concepts of network defense)

Attachment:- Template Project.rar

Verified Expert

In this assignment we have studied network security.In this assignment, we have create the different network plan and here we have seen different thread and here we have also seen the different thread and how thread are effect the data and what are breaches and how to resolve the issues.

Reference no: EM132194080

Questions Cloud

Concept of framing as it relates to life crucibles : Explain the concept of "framing" as it relates to life crucibles. what consistencies did you discover while reading about successful leaders and reflecting.
Why a credit card is not considered money : Why a credit card is not considered money? When the price of a good has increased, reflect on two issues you would considered before buying the good
How were saddam hussein and the men around him : How were Saddam Hussein and the men around him able to create and sustain such a powerful regime.
Explain several reasons a company might choose to permit : PHL 245: Do the pros of allowing use outweigh the cons? Or is it too difficult to generalize here? Support your answers with well-developed reasons.
Describe how the fundamental concepts of cyber defense : Describe how the fundamental concepts of cyber defense can be used to provide system security - Describe cyber defense tools, methods, and components
Relationship between negotiation and leadership : Discuss 3 character, driver, or risk assessment results could affect how an individual negotiations.
Calculate the socially efficient equilibrium : Suppose that the external marginal benefit of the defensive driving course is $5. Calculate the socially efficient equilibrium
Analyze the competitive advantage of the selected company : Analyze the competitive advantage of the selected company, to evaluate a set of suitable strategies, and to examine appropriate metrics.
A career path can help you set professional goals : Choosing a career path can help you set professional goals and achieve desired results. In the area of Supply Chain, various career paths are available.

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd