Identify threats and vulnerabilities for a representative


Individual Assignment : IT Threats and Vulnerabilities

Objective: Assess the major types of threats that modern enterprises face with regard to cybersecurity and how effective policy can mitigate those threats. Evaluate how an enterprise should implement long-term, strategic initiatives to promote cybersecurity.

Competencies: Critical thinking, communications skills

Individual Assignment

In 8-10 double-spaced pages, prepare a high level vulnerability assessment for their organization, which could be an entire organization or a unit of a larger organization.

Alternatively, students may opt to research another organization that they are interested in. One interest might be in anticipation of interviewing with that organization as the next step of their future career in cybersecurity policy.

If you have any questions, please ask them early in the week so you have enough time to complete the reading and this assignment on time.

Students are to

• identify threats and vulnerabilities for a representative latest evolution of computing and networking system resources for a major organization,

• identify, classify, and prioritize security measures and corresponding network equipment, software and procedures for addressing the threats and vulnerabilities (e.g., firewalls, proxy servers, key management, identity management, content filtering, anti-virus management, patch management, token administrator, certificate authority, DMZ),

• discuss security policies needed to address the threats and vulnerabilities and which support the security measures, and

• develop a prioritized strategy to deal with the most serious threats and vulnerabilities.

Prepare your paper in either Word or PDF format as your instructor requires.

It should be double-spaced with one-inch margins all around. The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines.

References, Title Page, and Abstract are NOT included in the page count. However, you do paginate the title of your paper. The title page should be page . All the rules regarding APA guidelines applies.

Solution Preview :

Prepared by a verified Expert
Management Information Sys: Identify threats and vulnerabilities for a representative
Reference No:- TGS02449294

Now Priced at $100 (50% Discount)

Recommended (92%)

Rated (4.4/5)