100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

its425

Beoordeling
-
Verkocht
-
Pagina's
10
Cijfer
A+
Geüpload op
14-02-2022
Geschreven in
2021/2022

Important! Read First Choose one of the following two assignments to complete this week. Do not do both assignments. Identify your assignment choice in the title of your submission. Option #1: Report on Organizational Security Threats and Vulnerabilities Prepare a detailed written report discussing the potential security threats and vulnerabilities of a fictitious organization, Adventure Scuba and Diving Institute (ASDI). Please see the Specification section for more details on assignment submission requirements. Scenario: Adventure Scuba and Diving Institute (ASDI) is located in the United States and offers training and certification programs for scuba and deep-sea diving. ASDI is a premier training school in the area of diving and scuba and has developed a wealth of proprietary training resources, videos, guides and manuals. The school suspects that competitors have tried to breach the organization's computer systems to gain access to these training materials. ASDI's network is comprised of two web servers, two file servers, one email server, 50 employee workstations, and a 50-workstation student computer lab. The school also has public and private Wi-Fi availability throughout the campus. Your firm has been hired as the IT security analyst to review, evaluate, and make recommendations with respect to maintenance of security of the organization's computer and network systems. You have been charged by your supervisor to prepare a preliminary report documenting the most critical security threats that ASDI faces. Your supervisor has given you the following resources that might be useful in your research and analysis: An article on the Help Net Security website (Links to an external site.) Common Vulnerabilities and Exposure (CVE) database search (Links to an external site.) Security organizations, such as Secunia (Links to an external site.) Your supervisor has asked you to consider and account for the following questions as you shortlist the threats and prepare your report: What threats are new this year and which have become more prevalent? Why are these threats more common and why are they important? What threats remain constant from year to year? Why? What threats do you believe will become more critical in the next 12 months? Why? Has an exploit been released? What is the likelihood of an exploit? How widely used is the software or system? Specifications for this Assignment: Submit the report as a single document in Word format. 8-10 pages in length Document and citation formatting should be in conformity with the CSU Global Writing Center (Links to an external site.). Cite and discuss at least three credible sources other than (or in addition to) the course textbook. The three sources recommended in this assignment description may be among these sources, which may also include sources found via Web search or in the CSU Global Library. Include in your report a network diagram of how you propose the network structure should be configured for optimum security. You can create this diagram using any drawing tool, including those embedded in Word, or by drawing the diagram by hand, scanning into an image file, and then pasting into your report. The sections of your report should be as follows: Cover Page Table of Contents Executive Summary (provide a project overview and summary in this section) Body of the report in narrative form in two sections: Section 1 of the on Vulnerabilities and Threats in narrative form, providing responses to each of the questions posed in the assignment scenario, and Section 2 on Countermeasures and Prevention Network Diagram References

Meer zien Lees minder
Instelling
Technology
Vak
Technology









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
Technology
Vak
Technology

Documentinformatie

Geüpload op
14 februari 2022
Aantal pagina's
10
Geschreven in
2021/2022
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

Running Head: ORGANIZATIONAL SECURITY THREATS AND VULNERABILITIES 1




its425

Student’s Name

Institution Affiliation

Assignment due Date

, ORGANIZATIONAL SECURITY THREATS AND VULNERABILITIES 2


Executive Summary

Adventure Scuba and Diving Institute is a learning institution offering training courses

covering the areas of scuba and diving. Lately, Adventure Scuba and Diving Institute has had

some suspicions of their fellow business organizations, or in other words, competitors are

attempting to breach their computer security systems with the main intention of gaining access

and obtaining data related to the training materials. ASDI consulted our company to help them

assess their security system condition and then provide the necessary recommendations on the

ways they could apply to secure and protect their computer network and security system against

the malicious attacks such as hacking and breaching into of the security system.

Confidential information of a company stored in the various computer system should be

secured against the threats and vulnerabilities concerning the stored data or information,

including access from an unauthorized user. Various threats are affecting the operation of

computer systems; some of the threats are greater in that they have a huge impact on the

computer system, such as bringing down the entire computer network system. We cautiously

studied the potential risks that may act as a security threat to Adventure Scuba and Diving

Institute and formulated some useful recommendations.

Security threats usually make their attacks from the base and therefore it is essential to

begin our conclusive investigation from the entry point; the areas where the computer systems

are connected to develop a decisive report on the level of threat. In this analysis, there must be a

network diagram than will be used for future references and also demonstrate the easier ways of

connecting the computer system and other network devices.

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
HighScoreSolns Minnesota State University, Mankato
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
18
Lid sinds
6 jaar
Aantal volgers
19
Documenten
68
Laatst verkocht
1 jaar geleden
NURSING EXAMS & STUDY MATERIALS

A wide range of comprehensive resources designed to help nursing students excel in their exams. Our materials are up-to-date and include practice exams, study guides, and revision notes that Will boost your academic success in nursing.

4,3

8 beoordelingen

5
2
4
6
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen