Take on the role of a cyber security threat analyst

Assignment Help Management Information Sys
Reference no: EM132294063

Part A:

Select an organization you wish to explore and use throughout the course.

As you make your selection, keep in mind that you will explore the following roles in the organization: Cyber Security Threat Analyst, Penetration Tester, Cyber Security Engineer, Risk Management Analyst, and Software Engineer. You need sufficient knowledge of the organization you select to complete these security assignments.

Part B:

A Cyber Security Threat Analyst conducts analysis, digital forensics, and targeting to identify, monitor, assess, and counter cyber-attack threats against information systems, critical infrastructure, and cyber-related interests.

Take on the role of a Cyber Security Threat Analyst for the organization you select. Use the Threats, Attacks, and Vulnerability Assessment Template to create a 3- to 4-page Assessment Document.

Research and include the following:

Tangible assets:

Include an assessment scope. The scope must include virtualization, cloud, database, network, mobile, and information system.

Asset descriptions:

Include a system model, A diagram and descriptions of each asset included in the assessment scope, and existing countermeasures already in place.

Threat agents and possible attacks

Exploitable vulnerabilities

Threat history

Evaluation of threats or impact of threats on the business

A prioritized list of identified risks

Countermeasures to reduce threat

Reference no: EM132294063

Questions Cloud

Describe a high-level timeline that includes key tasks : Estimate the project's overall cost and any key staffing and non-staffing resources needed.
Describe a hypothetical situation : Provide a real-world example or describe a hypothetical situation in which a legitimate organization used spam in an effective and nonintrusive manner.
Describe agile project management : Provide a brief summary of your project. Describe at least three (3) key milestones and/or deliverables for your project.
What has this course prepared you for : What has this course prepared you for? Has your awareness of physical security increased? if so, how
Take on the role of a cyber security threat analyst : A Cyber Security Threat Analyst conducts analysis, digital forensics, and targeting to identify, monitor, assess, and counter cyber-attack.
Uml diagrams to illustrate the system architecture : MN611 - System Architecture - Melbourne Institute of technology - UML diagrams to illustrate the system architecture - Analyse and model system functionality
Create a data flow diagram relating the tables : Illustrate the flow of data including both inputs and outputs for the use of a data warehouse. The diagram must map data between source systems.
What are the important things for vulture skims to have : And explain how does Voucher schemes help the H&M to increase customer engagement is through Voucher schemes?
How will the electronic medical record hinder the delivery : How will the electronic medical record (EMR)/electronic health record (EHR) help or hinder the delivery of health care?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Inventory transportation and warehousingimagine that you

inventory transportation and warehousingimagine that you are the logistics manager of a firm supplying fashion clothes

  Explain a technology innovation

This post addresses health technology issues - Explain a technology innovation that can change/ease an inefficient visit at a medical facility experienced by you or a family member

  Collect data and information regarding an rfid system

Each student is required to research and collect data and information regarding an RFID system that can be integrated into a specific business process to solve a problem in their individual industry, career or field of study. The paper should inc..

  What is the ethical danger of using agents in negotiation

What were the results of the study between district attorneys and public defenders on the use of deceptive negotiation tactics?

  Discuss a technology system that you suggest for the company

In 2-3 pages, discuss a technology system that you suggest for the company. Why you selected that particular database or information system?

  Improve patient outcomes

Health care professionals are constantly challenged to improve patient outcomes - you will provide professional feedback on whether you agree or disagree

  Explain the purpose of an it security policy

An introduction or overview of IT Security Policiesfor the executive branch of state governments (covering state agencies andoffices in the executive branch including the governor's office). Explain the purpose of an IT security policy and how it ..

  What is your assessment of the competitive situation

1- What is your assessment of the competitive situation in which B&O finds itself in 2006? 2- B&Os radical design driven approach seems at odds with conventional business wisdom at many points, what are the advantages and disadvantages of this appr..

  What was the impact on customers

How was this event tied to network security? Provide details about network infrastructure if possible.

  What are the goals of hate crime statutes

The mosque built by Muslim residents in the town of Unitas was recently vandalized. Derogatory remarks were spray painted on the front of the mosque, such as "Go home, al-Qaeda." The police have made it a priority to find the vandals and will most..

  What were the main accomplishment of the affordable care act

From the standpoint of health insurance, what were the main accomplishments of the Affordable Care Act?

  Analysis of the threat environment and potential weaknesses

Sifers-Grayson hired a cybersecurity consulting firm to help it meet the security requirements of a contract with a federal agency.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd