ISE 620 – Cybersecurity
Southern New Hampshire University
Scenario:
Analyze countermeasures for identified system vulnerabilities with respect to organizational needs.
Assignment Instructions / Questions:
1. Identify system vulnerabilities and potential risks.
- Categorize risks as technical, administrative, or physical.
- Explain how each vulnerability affects confidentiality, integrity, or availability.
2. Propose countermeasures with cost-benefit analysis.
- Include at least two alternatives per vulnerability.
- Discuss financial, operational, and security trade-offs.
3. Explain trade-offs between security, usability, and cost.
- Provide examples where stronger security reduces usability.
- Suggest methods to balance security and productivity.
4. Recommend best strategies for mitigating risks.
- Prioritize based on criticality.
- Justify recommendations with evidence from literature or frameworks (NIST, ISO).
Deliverables:
A countermeasure analysis report including identified risks, proposed solutions, trade-off discussion, and
prioritized recommendations.
,7-2 Final Project Milestone Three: Countermeasures Analysis
Southern New Hampshire University
ISE-620-Q4513 Incident Detection & Response
, Introduction
In the face of evolving cyber threats, Finger Lakes Community Bank must implement
comprehensive security countermeasures to safeguard its organizational systems,
operations, and personnel. Recent incidents, including phishing attacks, malware
infections, and denial of service (DoS) attempts, have highlighted significant vulnerabilities
within the bank's cybersecurity framework. These threats not only jeopardize the integrity
and availability of critical systems but also pose severe risks to the bank's operational
continuity and the safety of its personnel. This analysis outlines a strategic approach to
implementing advanced security measures to mitigate these risks, enhance the bank's
defensive capabilities, and ensure a secure and resilient
operational environment.
System
Implementing advanced email filtering and anti-phishing tools will significantly enhance
the bank's ability to detect and block malicious emails before they reach employees. This
preemptive measure ensures that phishing emails often contain malicious links or
attachments that are intercepted and neutralized, thereby preventing potential malware
infections and unauthorized access attempts. This directly reduces the risk of
organizational systems being compromised by such attacks, as the primary attack vector is