Throughout this course you will study the different roles that contribute to an organization's information security and assurance. Part A: Select an organization you wish to explore and use througho
CMGT/400 v7
Threats, Attacks, and Vulnerability Assessment Template
Instructions: Replace the information in brackets [ ] with information relevant to your project.
A Cyber Security Threat Analyst conducts analysis, digital forensics, and targeting to identify, monitor, assess, and counter cyber-attack threats against information systems, critical infrastructure, and cyber-related interests. Take on the role of a Cyber Security Threat Analyst for the approved organization you chose. Research the following information about the organization you chose and complete the Threats, Attacks, and Vulnerability Assessment template.
[Organization Name/Description] Assessment ScopeWhat are the tangible assets included? (Must include virtualization, cloud, database, network, mobile, information systems.) Identify all information systems, critical infrastructure, and cyber-related interests and combinations that will be assessed. Also, describe information systems, critical infrastructure, and cyber-related interests which will not be assessed and explain why.
[Response]
System ModelA diagram and descriptions of each asset included in the assessment scope.
[Diagram here or attached]
[Response]
Existing CountermeasuresDescribe existing countermeasure already in place.
[Response]
Threat Agents and Possible AttacksDefine 12 to 15 threat agents and possible attacks.
[Response]
Exploitable VulnerabilitiesIdentify 7 to 9 exploitable vulnerabilities.
[Response]
Threat History/Business Impact Threat History Events | Duration | Business Impact | Threat Resolution |
[Response] | [Response] | [Response] | [Response] |
[Response] | [Response] | [Response] | [Response] |
[Response] | [Response] | [Response] | [Response] |
[Response] | [Response] | [Response] | [Response] |
Risk | Probability | Priority | Owner | Countermeasures/Contingencies/Mitigation Approach |
[Response] | [Response] | [Response] | [Response] | [Response] |
[Response] | [Response] | [Response] | [Response] | [Response] |
[Response] | [Response] | [Response] | [Response] | [Response] |
[Response] | [Response] | [Response] | [Response] | [Response] |
Copyright© 2018 by University of Phoenix. All rights reserved.