Vulnerability assessment matrix

Assignment Help Database Management System
Reference no: EM13727649

Project: Vulnerability Assessment Matrix

Complete the Matrix of Vulnerability Attributes and System Object Types in Chapter 4 of the RAND document. A policy to protect the infrastructure must be developed to identify threats and locate vulnerabilities. Complete the matrix to determine requirements for the policy. Review page 28, table 4.2 to understand how to complete a matrix. Complete the matrix on page 27, table 4.1 based on the scenario below. Fill in the type of threat/vulnerability and your recommendation to correct the threat/vulnerability.
Scenario

In the organization, there is an insider threat. The employee who is the threat has been discussing a perceived vulnerability in the system. Many of the employees believe this vulnerability in the system and are attempting to create a patch. The insider threat employee has created malware in the system separate from the alleged vulnerability. While the technical team is searching for a vulnerability, the malware is traveling through the system disrupting all network traffic.

Question: What is the issue? Identify the threats and vulnerabilities in the matrix for this scenario. Also, identify the resolutions and solutions.

Question: Separate the issues from the solutions in a table with two columns and submit to your assignment folder.

Question: Identify the problem in a paragraph. Summarize the scenario and then analyze what has happened.

Question: Describe typical behaviors that could be indicators that an insider threat may or could occur.

Question: Create a table of analysis based on the attributes below. Use RAND as a resource for referring to your readings. Name the attributes in one column (behavioral sensitivity). In the second column, identify possible indicators (behavior to be aware of). In the third column, list proposed resolutions (plan of action), and in the fourth column, solutions (repairs, lessons learned, etc.). After preparing a cover sheet, prepare a table of analysis on the attributes below:

Table 4.1

Matrix of Vulnerability Attributes and System Object Types

RANDMR1601-table4.1

1. Behavioral sensitivity/Fragility
2. Malevolence
3. Rigidity
4. Malleability
5. Gullibility/Deceivability/naiveté
6. Complacency
7. Separate ability
8. Logic/Implementation
9. Errors; fallibility
10. Design sensitivity/Fragility/limits/Finiteness
11. Unrecoverable
12. Singularity
13. Attributes
14. Uniqueness
15. Centrality
16. Homogeneity
17. Design/Architecture
18. Corruptibility/Controllability
19. Accessible/Detectable/Identifiable
20. Transparent
21. Interception
22. Hard to manage or control
23. Self-unawareness and unpredictability
24. Predictability Behavior General (other observations overall; name two not on list)

Reference no: EM13727649

Questions Cloud

Erp systems improve business processes : We begin surveying the use of Information Systems technology and ERP systems to improve business processes in Sales, Procurement and other functional and cross-functional areas.
Explain the related concepts of data warehousing : Explain the related concepts of data warehousing and data mining, What are the elements of video marketing strategy? Why it is important for the marketers have a strategy for their use of video
Similarities among the philosophies of deming and juran : What assumptions about the relationship between the company standards and those of the customer are made by internally-oriented definitions of quality? What are the differences and similarities among the philosophies of Deming, Juran, Crosby, and T..
Explain what is a competitive advantage : What is a competitive advantage? How does marketing contribute to the creation of a competitive advantage, In your own words explain, are entrepreneurs born or made
Vulnerability assessment matrix : Create a table of analysis based on the attributes below. Use RAND as a resource for referring to your readings. Name the attributes in one column (behavioral sensitivity). In the second column, identify possible indicators (behavior to be aware o..
Write paper explaining an article about marketing : I need two (2page) papers each paper explaining an article about marketing. These are 2 separate papers for the same class using two different articles both focused on marketing
What role does marketing play in the success of organization : You have clicked the link and watched the video (https://www.youtube.com/watch?v=F_Fr7EYBFEo&feature=player_embedded), what role does marketing play in the success of the organization
How did the development of trade impact the caste system : How did the development of trade and manufacturing impact the caste system during indias classical period?
Impasse between negotiators : Assume that you are part of a mediation team that has been brought in to help overcome an impasse between negotiators who are deliberating the use of embryonic stem cells for a research project.

Reviews

Write a Review

Database Management System Questions & Answers

  Different ways of implementing one-to-one relationships

Describe the different ways of implementing one-to-one relationships. Assume you are maintaining information on offices and faculty.

  Convert an erd to a relational schemacovert the extended

convert an erd to a relational schemacovert the extended entity relationship diagram eerd for orthopedic alliance of

  What is candidate key and database is a set of one or more

question 1a candidate key isrequired to be unique.used to represent rows in relationships.a candidate to be the primary

  Problem related pseudocode for a game application

Create the pseudocode for a game application that contains an array of five (5) multiple-choice questions related to your favorite hobby. Each question contains four answer choices - A..., B..., C..., D...

  Explaining content of document in natural language

Explain the content of this document in natural language;Design the graph representation of document;

  Sketch object-oriented model for private airport database

Sketch an object-oriented model for a small private airport database that is used to keep track of airplanes, their owners, airport employees, and pilots.

  Concept of entity in a process

Question 1: Use an example to explain what is an entity in a process? What is an attribute? Question 2: Define a measure that can be used to judge a code's quality. Name one situation you could use this measure. Question 3: Name the situation one has..

  Metropolis toys is an independent family-owned manufacturer

metropolis toys is an independent family-owned manufacturer of wooden toys. the toys are designed by members of the

  Develop a model using an excel spreadsheet

Develop a model using an Excel spreadsheet to project financial statements for Rama's Lawn Mowing -  find how many jobs per year would be required for Rama's company to break even; i.e., to achieve a net present value of  0.00.

  Create erd models

Select one of the Real World Scenarios and use the experience you have that is related to the scenario you have chosen or research online; and then post your comments and solutions about your experience.

  Design a database for an insurance company

Don't forget to underline key attributes for entity sets and include arrowheads indicating the multiplicity of relationships

  Determine the commissions paid to specific employees

Design a query that will allow the finance department to determine the commissions paid to specific employees of the sales department for the month of December.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd