or your initial post, organize your revised research questions, current thesis statement, and an outline or checklist of your plan for conducting further research on your topic into a new discussion p

Type: Discussion Board

Unit:  Threats and Vulnerabilities

Due Date:  Tue,4/9/19

Grading Type: Numeric

Points Possible:  75

Points Earned: 

Deliverable Length:  400–600 words

View objectives for this assignment

Go To:

  • Assignment Details

  • Scenario

  • Learning Materials

  • Reading Assignment

My Work:

Online Deliverables:

  • Discussion Board

Looking for tutoring? Go to Smarthinking

Collapse All | Expand All Collapse All | Expand All

Assignment Details

Assignment Description

Primary Discussion Response is due by Friday (11:59:59pm Central), Peer Responses are due by Tuesday (11:59:59pm Central).

Primary Task Response: Within the Discussion Board area, write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.
This Discussion Board has 2 parts:

  1. Differentiate among security threats and security vulnerabilities.

    • Are system and application threats the same? Why or why not?

    • Are system and application vulnerabilities the same? Why or why not?

  2. Remember that systems are composed of multiple elements, including applications.

    • How would an application affect the overall security posture of the system?

    • Are there system threats or vulnerabilities that are specific to the design of the system and independent of applications?

Responses to Other Students: Respond to at least 2 of your fellow classmates with at least a 100-word reply about their Primary Task Response regarding items you found to be compelling and enlightening. To help you with your discussion, please consider the following questions:

  • What did you learn from your classmate's posting?

  • What additional questions do you have after reading the posting?

  • What clarification do you need regarding the posting?

  • What differences or similarities do you see between your posting and other classmates' postings?

For assistance with your assignment, please use your text, Web resources, and all course materials.

Reading Assignment

Unit 1: CYBR611 CTU Library Guide

Guide to Cyber Threat Information Sharing

  • Chapter 2: Basics of Cyber Threat Information Sharing

Guide for Conducting Risk Assessment

  • Chapter 2: The Fundamentals

Resources

National Institute of Standards and Technology. (2012). Guide for conducting risk assessment. Retrieved from https://csrc.nist.gov/publications/detail/sp/800-30/rev-1/final

National Institute of Standards and Technology. (2016). Guide to cyber threat information sharing. Retrieved from http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-150.pdf

Assignment Objectives

  • Distinguish between system and application security threats and vulnerabilities

Other Information