CMGT/400 V7 Threats, Attacks, And Vulnerability Assessment Writing Help

Instructions: Replace the information in brackets [ ] with information relevant to your project.

A Cyber Security Threat Analyst conducts analysis, digital forensics, and targeting to identify, monitor, assess, and counter cyber-attack threats against information systems, critical infrastructure, and cyber-related interests. Take on the role of a Cyber Security Threat Analyst for the approved organization you chose. Research the following information about the organization you chose and complete the Threats, Attacks, and Vulnerability Assessment template.

Information Assurance and Security

[Organization Name/Description]
Assessment Scope

What are the tangible assets included? (Must include virtualization, cloud, database, network, mobile, and information systems.) Identify all information systems, critical infrastructure, and cyber-related interests and combinations that will be assessed. Also, describe information systems, critical infrastructure, and cyber-related interests that will not be assessed and explain why.

[Response]

System Model

A diagram and descriptions of each asset included in the assessment scope.

[Diagram here or attached]

[Response]

Existing Countermeasures

Describe existing countermeasure already in place.

[Response]

Threat Agents and Possible Attacks

Define 12 to 15 threat agents and possible attacks.

[Response]

Exploitable Vulnerabilities

Identify 7 to 9 exploitable vulnerabilities.

[Response]

Hire Assignment Writers

Threat History/Business Impact

Threat History Events Duration Business Impact Threat Resolution
[Response] [Response] [Response] [Response]
[Response] [Response] [Response] [Response]
[Response] [Response] [Response] [Response]
[Response] [Response] [Response] [Response]

Risks and Contingencies Matrix

Risk Probability Priority Owner Countermeasures/Contingencies/Mitigation Approach
[Response] [Response] [Response] [Response] [Response]
[Response] [Response] [Response] [Response] [Response]
[Response] [Response] [Response] [Response] [Response]
[Response] [Response] [Response] [Response] [Response]

Part A:

Select an organization you wish to explore and use throughout the course.

As you make your selection, keep in mind that you will explore the following roles in the organization: Cyber Security Threat Analyst, Penetration Tester, Cyber Security Engineer, Risk Management Analyst, and Software Engineer. You need sufficient knowledge of the organization you select to complete these security assignments.

Part B:

A Cyber Security Threat Analyst conducts analysis, digital forensics, and targeting to identify, monitor, assess, and counter cyber-attack threats against information systems, critical infrastructure, and cyber-related interests.

Take on the role of a Cyber Security Threat Analyst for the organization you select. Use the Threats, Attacks, and Vulnerability Assessment Template ( also attached in the email ) to create a 3- to 4-page Assessment Document.

Research and include the following:

  • Tangible assets:
    • Include an assessment scope. The scope must include virtualization, cloud, database, network, mobile, and information system.
  • Asset descriptions:
    • Include a system model, A diagram and descriptions of each asset included in the assessment scope, and existing countermeasures already in place. (Microsoft® Visio® or Lucidhart®)
  • Threat agents and possible attacks
  • Exploitable vulnerabilities
  • Threat history
  • Evaluation of threats or impact of threats on the business
  • A prioritized list of identified risks
  • Countermeasures to reduce threat

No1AssignmentHelp.Com is Australia's Leading and online writing assignment help company and offers academic assignment writing help in USA, UK, and UAE. Our expert Assignment Writers do University of Phoenix assignments as per university guidelines. Contact Us Today for your assignment to be done.