Identify and discuss vulnerabilities and threats - develop


IT Threats and Vulnerabilities

Objective: Assess the major types of threats that modern enterprises face with regard to cybersecurity and how effective policy can mitigate those threats. Evaluate how an enterprise should assess its vulnerabilities and implement long-term, strategic initiatives to promote cybersecurity.

Competencies: Critical thinking, communications skills

First, pick an organization, which could be:

1. an entire organization, or

2. a unit of a larger organization, or

3. another organization in which the student is interested in for future job prospects.

For that organization, for a representative latest evolution of computing and networking system resources,

Prepare a high level vulnerability assessment. This means-

• identify and discuss vulnerabilities and threats

• develop a prioritized strategy to deal with the 3 or 4 most serious threats and vulnerabilities

• identify and classify security measures and corresponding network equipment, software and procedures for addressing the threats and vulnerabilities (e.g., firewalls, proxy servers, key management, identity management, content filtering, anti-virus management, patch management, token administrator, certificate authority, DMZ),

• discuss security policies needed to address the threats and vulnerabilities and which support the security measures

Solution Preview :

Prepared by a verified Expert
Computer Network Security: Identify and discuss vulnerabilities and threats - develop
Reference No:- TGS01116050

Now Priced at $90 (50% Discount)

Recommended (98%)

Rated (4.3/5)