Explaining the threat modeling techniques

Assignment Help Computer Engineering
Reference no: EM132239254

Question: Take a look at the attachment. This gives you a visual of Marge's retail store's current IT infrastructure. Marge is looking to enhance her online sales but before she does she has called you to conduct a thorough threat assessment and recommend threat mitigations and controls prior to moving forward with the new project she is calling Using the Internet to Increase Sales.

Write a 3 to 5 page paper with proper APA formatting using the threat modeling techniques we have gone over thus far to uncover any threats that jump out from the attachment. Use critical thinking, look for information flows, exposures, vulnerabilities, and so on. Once you have identified threats suggest mitigations that would reduce the risk of those threats. Also, note that Marge is using a public IP space of 200.200.200.0/24 for the entire network infrastructure i.e. one Local Area Network.

You should at a minimum uncover 5 potential threats within this architecture.

Information related to above question is enclosed below:

Attachment:- MargesRetailStore.rar

Reference no: EM132239254

Questions Cloud

Did you find any of these reasons or causes surprising : The decline in sheep and lamb numbers in the U.S. can be attributed to multiple reasons and causes.
How the different healthcare organizations within community : Discuss how three different healthcare organizations within your community use marketing tools to promote their products and services.
Discuss each component and the specific information : Discuss each component and the specific information that can be included within each section of the policy. Support your paper with five resources.
How internal monitoring and auditing is conducted : How internal monitoring and auditing is conducted. How compliance and practice standards are implemented.
Explaining the threat modeling techniques : Write a 3 to 5 page paper with proper APA formatting using the threat modeling techniques we have gone over thus far to uncover any threats that jump out.
Determine the percentage of ever-smoker males : Determine the percentage of ever-smoker males 65-75 years of age who have undergone CT screening.
Demonstrating a connection to your current work environment : Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.
Explain the associated health problems of obesity epidemic : Explain the associated health problems of the obesity epidemic and eating disorders such as anorexia nervosa, bulimia nervosa, and binge-eating.
Debate about the ending of capital punishment : Analyst staff at the Texas Department of Criminal Justice reporting to senior management about aspects of their operations. A campaign group looking.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Explain what is the best way to connect the workstations

Explain what is the best way to connect the workstations to the mainframe computer? Explain your reasoning and all the possible solutions you considered.

  What is the minimum budget to index all pages

What is the minimum budget to index all pages? If you assume that each query can be answered by looking at data in just one partition.

  Calculate number of vertices that appear on fourth level

Calculate the number of vertices that will appear on the fourth level. You may reduce the size of the tree by taking advantage of symmetries.

  Write a program to compute factorial

Write a program that ask user to enter a number (i.e. integer). It then checks whether the number is less than 10 or not.

  Describe the ethical hacking and hacking a network

Describe the difference between ethical hacking and hacking a network

  Plot the rate as a function of p for different values of m

Plot the rate as a function of p for different values of M, and discuss the trade-offs involved in selecting larger or smaller values of M.

  Questionour program has to take a string representing a

questionour program has to take a string representing a sentence in english and format it properly. the input sentence

  Describe the four steps of a typical plc processor scan

The actual scan time, or time it takes the PLC to complete a four-step scan, decreases as the number of program words increases.

  Find the most general unifier

Find the most general unifier for f (X, g (a, Z, W), a, h (X, b, W)) and f (h (a, Z), g (a, h (Z, b), X), Z, h (d, b, a))

  Create an array that store peoples first names

Create an array of people's first names. Using a loop, read the names from a text (txt) file, and store each one into the array. The array should allow for a maximum of 100 entries.

  Why would the relationships be identifying or nonidentifying

Draw the relationships that follow. Would the relationships be identifying or nonidentifying? Why? A patient must be assigned to only one doctor, and a doctor can have many patients.

  How the boundary-layer thickness varies with x

A flat ribbon heat strip is oriented vertically on an insulating substrate. Let the ribbon be 1 m wide by 3 m long. Its energy dissipation is 0.5 W/cm2.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd