Describe how the fundamental concepts of cyber defense

Assignment Help Other Subject
Reference no: EM132194080

Project

OVERVIEW

A risk assessment is a process for identifying and evaluating risk. It is a key activity in a cost-effective and balanced approach to managing risk for systems. The first step in a risk assessment is identifying the critical assets for the organization. It is not possible to protect the items most valuable to the organization if they are not identified as such. Once assets are identified, then the scope of the risk assessment must be determined.

A vulnerability scan is conducted for the network. The results of the vulnerability scan are used to identify holes in the security posture. These results can be rated as critical, high, medium, and low and addressed accordingly with critical and high results being much more important to address soonest. For this assignment, you will create a risk assessment based on themes discussed in this course. The main purpose of this final project is to tie the concept of risk to a holistic perspective of the organization's processes.

INSTRUCTIONS

Based on the ABC Company system scenario, your final project must contain a summary of all critical, high, and medium findings; a recommendation for remediation of those findings; and any suggestions for improvement to the network layout for the organization. This assignment requires a 3- to 5-page Risk Assessment Report (template provided) in APA format, along with an additional references page. See below for details.

1. A vulnerability scan, based on a Nessus scan, is part of this assignment (results provided). Note:Actual hostnames and IP addresses were removed from this scan for security purposes. However, in a "real" scan result, this information would be included. Analyze the results of the scan to identify the critical, high, and medium findings relevant to the scope of your assessment. Keep in mind what would be the most important assets for ABC Company.

2. After identifying relevant findings from the vulnerability scan in step 1, analyze the network diagram for ABC Company (below) and provide recommendations to ABC Company on how to improve their security posture.

3. Complete a risk assessment using the risk assessment report template to include the following:
a. Complete all applicable sections, as explained in the instructions portion of the template.
b. Identify assets and threats in Sections 1.3 and 1.4 of the template.
c. Identify vulnerabilities in the network design and vulnerabilities in the scan results in Section 1.5 of the template.
d. Complete a risk analysis in Section 1.6 of the template.

4. Provide recommendations in Section 2 of the template including:
a. Corrective actions and estimated timetables for fixes
b. Estimated residual risk to ABC Company
c. A future plan (rescan on a specific periodic basis, re-run risk assessments annually, etc.).

Submit the final project (risk assessment report) to your mentor for grading. Consult the Course Calendar for due dates.

This assignment corresponds to or addresses the following Cybersecurity Program outcomes for the bachelor of science degree:

• Students assess and apply cybersecurity principles, tools, and methods to defend information systems against cyber threats. [BSCS1 1]
• Students apply cybersecurity design best practices and technologies to prevent and mitigate cyberattacks and vulnerabilities. [BSCS1 2]
• Students design, implement, and administer networks in a secure manner by integrating network defense technologies, monitoring tools, and measures. [BSCS1 3]

Your work on this assignment should reflect your ability to:

• Describe how the fundamental concepts of cyber defense can be used to provide system security. (Concepts of cyber defense)
• Describe cyber defense tools, methods, and components. (Cyber defense tools, methods, and components)
• Examine the architecture of a particular system and identify significant vulnerabilities, risks, and points at which specific security technologies/methods should be employed. (System architecture)
• Show usage of a network monitoring tool. (Uses of network monitoring tools)
• Describe concepts of network defense. (Concepts of network defense)

Attachment:- Template Project.rar

Verified Expert

In this assignment we have studied network security.In this assignment, we have create the different network plan and here we have seen different thread and here we have also seen the different thread and how thread are effect the data and what are breaches and how to resolve the issues.

Reference no: EM132194080

Questions Cloud

Concept of framing as it relates to life crucibles : Explain the concept of "framing" as it relates to life crucibles. what consistencies did you discover while reading about successful leaders and reflecting.
Why a credit card is not considered money : Why a credit card is not considered money? When the price of a good has increased, reflect on two issues you would considered before buying the good
How were saddam hussein and the men around him : How were Saddam Hussein and the men around him able to create and sustain such a powerful regime.
Explain several reasons a company might choose to permit : PHL 245: Do the pros of allowing use outweigh the cons? Or is it too difficult to generalize here? Support your answers with well-developed reasons.
Describe how the fundamental concepts of cyber defense : Describe how the fundamental concepts of cyber defense can be used to provide system security - Describe cyber defense tools, methods, and components
Relationship between negotiation and leadership : Discuss 3 character, driver, or risk assessment results could affect how an individual negotiations.
Calculate the socially efficient equilibrium : Suppose that the external marginal benefit of the defensive driving course is $5. Calculate the socially efficient equilibrium
Analyze the competitive advantage of the selected company : Analyze the competitive advantage of the selected company, to evaluate a set of suitable strategies, and to examine appropriate metrics.
A career path can help you set professional goals : Choosing a career path can help you set professional goals and achieve desired results. In the area of Supply Chain, various career paths are available.

Reviews

Write a Review

Other Subject Questions & Answers

  What are some specialized police units that have emerged

What are some specialized police units that have emerged from contemporary policing?If you had your choice of patrol, what method would you select? Why?What are some of the dangers and challenges undercover officers face that uniformed officers typic..

  What court case justify your decision

At which time he found a knife covered in blood on the front seat. It was later discovered that the knife was used in the murder of another police officer. Should the knife be excluded? What court case(s) justify your decision

  Identify the writer and essay that you think solved problem

Identify the writer and essay (by name) that you think best solved the problem before him or her. How did the person overcome it (giving examples from the stories you read)

  Creating an outline for your final essay

You discuss one work of art that you have not used previously in this course. Focus on only one work of art that will be thoroughly discussed your final essay

  Explain the differences among consumers

Explain the differences among consumers' wants, needs, and opportunitiesConsumers often experience what's called a want-got gap, which describes the discrepancy between their actual situation and their desired situation. Consumers often do not recogn..

  How do you feel that the media perpetuates discrimination

How do you feel that the media perpetuates discrimination and/or stratification based on race, gender, and class?

  Discuss the implications of research

If you were to administer the Stroop Effect test (in english) on a person from england and someone from China who only speaks Mandarin, examine the predicted.

  What has your current involvement in volunteerism taught you

Why are you a good candidate for this award and what would it mean to you to receive a scholarship from this application process

  The hidden injuries of class

Do you believe that Richard Sennett and Jonathan Cobb state in the book that people are motivated to make sacrifices and work harder

  In an article appearing in todays health a writer states

1.which of the following values is not typically used for ?a.0.01b.0.10c.0.50d.0.052.a null hypothesis can only be

  Absolute universalism versus cultural relativism

What is the difference between Human Rights and Legal Rights?

  Best practices with the population group

Student will research 5 scholarly journal articles - no more than 3 years old, regarding Best Practices with the population group the Field Agency serves

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd