Part A: Selectan organization you wish to explore and use throughout the course. As you make your selection, keep in mind that you will explore the following roles in the organization: Cyber Security

CMGT/400 v7

Threats, Attacks, and Vulnerability Assessment Template

Instructions: Replace the information in brackets [ ] with information relevant to your project.

A Cyber Security Threat Analyst conducts analysis, digital forensics, and targeting to identify, monitor, assess, and counter cyber-attack threats against information systems, critical infrastructure, and cyber-related interests. Take on the role of a Cyber Security Threat Analyst for the approved organization you chose. Research the following information about the organization you chose and complete the Threats, Attacks, and Vulnerability Assessment template.

[Organization Name/Description] Assessment Scope

What are the tangible assets included? (Must include virtualization, cloud, database, network, mobile, information systems.) Identify all information systems, critical infrastructure, and cyber-related interests and combinations that will be assessed. Also, describe information systems, critical infrastructure, and cyber-related interests which will not be assessed and explain why.

[Response]

System Model

A diagram and descriptions of each asset included in the assessment scope.

[Diagram here or attached]

[Response]

Existing Countermeasures

Describe existing countermeasure already in place.

[Response]

Threat Agents and Possible Attacks

Define 12 to 15 threat agents and possible attacks.

[Response]

Exploitable Vulnerabilities

Identify 7 to 9 exploitable vulnerabilities.

[Response]

Threat History/Business Impact

Threat History Events

Duration

Business Impact

Threat Resolution

[Response]

[Response]

[Response]

[Response]

[Response]

[Response]

[Response]

[Response]

[Response]

[Response]

[Response]

[Response]

[Response]

[Response]

[Response]

[Response]

Risks and Contingencies Matrix

Risk

Probability

Priority

Owner

Countermeasures/Contingencies/Mitigation Approach

[Response]

[Response]

[Response]

[Response]

[Response]

[Response]

[Response]

[Response]

[Response]

[Response]

[Response]

[Response]

[Response]

[Response]

[Response]

[Response]

[Response]

[Response]

[Response]

[Response]

Copyright© 2018 by University of Phoenix. All rights reserved.