Create matrix of vulnerability attributes and system object

Assignment Help Other Subject
Reference no: EM13770599

Create a Matrix of Vulnerability Attributes and System Object

Complete the Matrix of Vulnerability Attributes and System Object Types of the RAND document. A policy to protect the infrastructure must be developed to identify threats and locate vulnerabilities. Complete the matrix to determine requirements for the policy. Review page 28, table 4.2 to understand how to complete a matrix. Complete the matrix on page 27, table 4.1 based on the scenario below. Fill in the type of threat/vulnerability and your recommendation to correct the threat/vulnerability.

Scenario

In the organization, there is an insider threat. The employee who is the threat has been discussing a perceived vulnerability in the system. Many of the employees believe this vulnerability in the system and are attempting to create a patch. The insider threat employee has created malware in the system separate from the alleged vulnerability. While the technical team is searching for a vulnerability, the malware is traveling through the system disrupting all network traffic. What is the issue? Identify the threats and vulnerabilities in the matrix for this scenario. Also, identify the resolutions and solutions. Separate the issues from the solutions in a table with two columns and submit to your assignment folder.

The issues are provided in Table 1. You will create resolutions/solutions for the threat or vulnerability below.

Table 4.1

Matrix of Vulnerability Attributes and System Object Types

RANDMR1601-table4.1

Behavioral sensitivity/Fragility

Malevolence

Rigidity

Malleability

Gullibility/Deceivability/naiveté

Complacency

Separate ability

Logic/Implementation

Errors; fallibility

Design sensitivity/Fragility/limits/

Finiteness

Unrecoverable

Singularity

Attributes

Uniqueness

Centrality

Homogeneity

Design/Architecture

Corruptibility/Controllability

Accessible/Detectable/Identifiable/Transparent/Interception

Hard to manage or control

Self-unawareness and unpredictability

Predictability Behavior General.

Reference no: EM13770599

Questions Cloud

Difference between a simple interest note and a simple disco : You decide to take out an ordinary interest loan of $30,000 at 4%, on a 90 day note. a.) In 45 days you decide to make a payment of $10,000 on the loan. What is your new principal? Explain how you got the answer. b.)How much did you pay at the end of..
What is the minimum bid per widget : A firm is considering bidding on a project to produce eight widgets per year for the next four years. In order to complete the project, the firm must lease facilities for $30,000 per year, purchase equipment that costs $100,000, as well as pay labour..
Yield-to-maturity of a bond with a finite maturity : The yield-to-maturity of a bond with a finite maturity date is a function of all of the following variables except:
What is occurring and the possible uses of the information : Is the activity occurring in packets 9-18 abnormal? If so, provide a detailed interpretation of what is occurring, and the possible uses of the information gained. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I ..
Create matrix of vulnerability attributes and system object : Create a Matrix of Vulnerability Attributes and System Object. A policy to protect the infrastructure must be developed to identify threats and locate vulnerabilities.
How to assign the cost of direct labor to each job : What services does the firm oiler, what document or procedure do you use to collect the costs of services per formed for each customer and how to assign the cost of direct labor to each job?
What is the minimum-cost output : What is the minimum-cost output? What is this manufacturer's fixed cost, For each level of output, calculate the variable cost (VC). For each level of output except zero output, calculate the average variable cost (AVC), average total cost (ATC), a..
What is meant by a protective put : What is meant by a protective put? What position in call options is equivalent to a protective put?
Problem related to organization financial performance : Evaluate your organization's financial performance during the past 2 years, using financial ratios. Calculate the ratios for each year:

Reviews

Write a Review

Other Subject Questions & Answers

  Describing qualitative and quantitative research

Assume you're to study police brutality, what techniques of research (demographics, historical data, surveys, interviews, or observation) would you utilize?

  Important concepts for psychology professionals

Why do you think being able to discuss validity and reliability are important concepts for psychology professionals.

  What is the serial position effect

Be able to recognize and identify the differences between operant and classical conditioning.

  Cosmic microwave background radiation is the radiation left

I thought the big bang was hot! If the cosmic microwave background radiation is the radiation left over from the big band, why is it only 3k?

  Critically discuss and analyze the preventive approaches

Mass tourism has recently been recognized within the tourism literature as potentially being capable of more responsible activities and able to integrate sustainability principles (Budeanu, 2005) Critically discuss and analyze the preventive app..

  Discuss how the material in music perception

Imagine yourself at a concert of your favorite music. Discuss how the material in music perception might make you more aware of perceptual qualities of the music. Be certain to mention pitch, tonality, loudness, timbre, and tone combination.

  Evidence-definition of an expert witness

As a group, discuss the following using the Small Group Discussion Area: What is the definition of an expert witness? Explain in your own words. Who can be an expert witness?

  Memory-serial learning-primacy-recency effects

Describe the term serial learning? Please give examples, preferably from your own life experience.

  General contractor for a company

Jake works as a General Contractor for a company - his 6th year. He has been recently promoted and now manages eight FT employees. Kate (live in girlfriend) is 8 months pregnant - trying to finish a course in medical billing before the baby.

  Regarding the church

Protestant views on unity include: the church is one but the unity is invisible; the unity will be manifested at the end of the world when all those who are saved will be together in heaven; the diverse Christian churches are one in that they are bra..

  Contrast controlled experiments-multi-variate testing

Compare and contrast Controlled Experiments, Multi-Variate Testing and A/B Testing by defining each, providing a short example, and listing 3 pros and 3 cons of each method.

  Inherited such behavior patterns from the primates

Explain why anthropologists look at primates for solutions to conundrums of human behavior. Pick a phenomenon such as flirting and explain how humans have inherited such behavior patterns from the primates?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd