100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Summary

Summary Final Project Milestone Three: Countermeasures Analysis ISE 620 Cybersecurity Southern

Rating
-
Sold
-
Pages
16
Uploaded on
11-09-2025
Written in
2025/2026

Final Project Milestone Three: Countermeasures Analysis ISE 620 Cybersecurity Southern New Hampshire University Scenario: Analyze countermeasures for identified system vulnerabilities with respect to organizational needs. Assignment Instructions / Questions: 1. Identify system vulnerabilities and potential risks. - Categorize risks as technical, administrative, or physical. - Explain how each vulnerability affects confidentiality, integrity, or availability. 2. Propose countermeasures with cost-benefit analysis. - Include at least two alternatives per vulnerability. - Discuss financial, operational, and security trade-offs. 3. Explain trade-offs between security, usability, and cost. - Provide examples where stronger security reduces usability. - Suggest methods to balance security and productivity. 4. Recommend best strategies for mitigating risks.

Show more Read less










Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
September 11, 2025
Number of pages
16
Written in
2025/2026
Type
Summary

Subjects

Content preview

Final Project Milestone Three: Countermeasures Analysis

ISE 620 – Cybersecurity

Southern New Hampshire University


Scenario:

Analyze countermeasures for identified system vulnerabilities with respect to organizational needs.


Assignment Instructions / Questions:

1. Identify system vulnerabilities and potential risks.
- Categorize risks as technical, administrative, or physical.
- Explain how each vulnerability affects confidentiality, integrity, or availability.

2. Propose countermeasures with cost-benefit analysis.
- Include at least two alternatives per vulnerability.
- Discuss financial, operational, and security trade-offs.

3. Explain trade-offs between security, usability, and cost.
- Provide examples where stronger security reduces usability.
- Suggest methods to balance security and productivity.

4. Recommend best strategies for mitigating risks.
- Prioritize based on criticality.
- Justify recommendations with evidence from literature or frameworks (NIST, ISO).


Deliverables:

A countermeasure analysis report including identified risks, proposed solutions, trade-off discussion, and
prioritized recommendations.

,7-2 Final Project Milestone Three: Countermeasures Analysis




Southern New Hampshire University



ISE-620-Q4513 Incident Detection & Response

, Introduction



In the face of evolving cyber threats, Finger Lakes Community Bank must implement

comprehensive security countermeasures to safeguard its organizational systems,

operations, and personnel. Recent incidents, including phishing attacks, malware

infections, and denial of service (DoS) attempts, have highlighted significant vulnerabilities

within the bank's cybersecurity framework. These threats not only jeopardize the integrity

and availability of critical systems but also pose severe risks to the bank's operational

continuity and the safety of its personnel. This analysis outlines a strategic approach to

implementing advanced security measures to mitigate these risks, enhance the bank's

defensive capabilities, and ensure a secure and resilient


operational environment.



System



Implementing advanced email filtering and anti-phishing tools will significantly enhance

the bank's ability to detect and block malicious emails before they reach employees. This

preemptive measure ensures that phishing emails often contain malicious links or

attachments that are intercepted and neutralized, thereby preventing potential malware

infections and unauthorized access attempts. This directly reduces the risk of

organizational systems being compromised by such attacks, as the primary attack vector is

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
newage Uop
View profile
Follow You need to be logged in order to follow users or courses
Sold
22
Member since
3 year
Number of followers
15
Documents
4723
Last sold
6 months ago
A+ Self prepared Study guides for my peers

Truly helpful study guides

4.2

6 reviews

5
3
4
1
3
2
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions