Respond to the post bellow offering additional/alternative ideas regarding opportunities and risks related to the observations shared.                               

Type: Individual Project

Unit:  Threats and Vulnerabilities

Due Date:  Wed,4/10/19

Grading Type: Numeric

Points Possible:  100

Points Earned: 

Deliverable Length:  700–900 words

View objectives for this assignment

Go To:

  • Assignment Details

  • Scenario

  • Learning Materials

  • Reading Assignment

My Work:

Online Deliverables:

  • Submissions

Looking for tutoring? Go to Smarthinking

Collapse All | Expand All Collapse All | Expand All

Assignment Details

Assignment Description

Select an organization for your Cybersecurity Management Plan. This organization can be real or fictitious, but you should have enough information about the organization to execute the tasks required in each Individual Project (IP).
Create a document for the Cybersecurity Management Plan. As you continue through the course, you will add material to each section and complete a final report. Future sections will be completed during the weeks they are assigned, and although those sections headings should be included, the content will be blank until that week arrives.
New Content for IP 1

Describe the following in 700–900 words:

  • The systems in your organization (i.e., the type and number of computer systems and operating systems used, along with a high-level view of the infrastructure). A network diagram should be pasted in the Word document.

  • System and application threats for your organization.

  • System and application vulnerabilities for your organization.

Please submit your assignment.

For assistance with your assignment, please use your text, Web resources, and all course materials.

Reading Assignment

Unit 1: CYBR611 CTU Library Guide

Guide to Cyber Threat Information Sharing

  • Chapter 2: Basics of Cyber Threat Information Sharing

Guide for Conducting Risk Assessment

  • Chapter 2: The Fundamentals

Resources

National Institute of Standards and Technology. (2012). Guide for conducting risk assessment. Retrieved from https://csrc.nist.gov/publications/detail/sp/800-30/rev-1/final

National Institute of Standards and Technology. (2016). Guide to cyber threat information sharing. Retrieved from http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-150.pdf

Assignment Objectives

  • Distinguish between system and application security threats and vulnerabilities

Other Information

There is no additional information to display at this time.