IT Threats and Vulnerabilities
Objective: Assess the major types of threats that modern enterprises face with regard to cybersecurity and how effective policy can mitigate those threats. Evaluate how an enterprise should assess its vulnerabilities and implement long-term, strategic initiatives to promote cybersecurity.
Competencies: Critical thinking, communications skills
First, pick an organization, which could be:
1. an entire organization, or
2. a unit of a larger organization, or
3. another organization in which the student is interested in for future job prospects.
For that organization, for a representative latest evolution of computing and networking system resources,
Prepare a high level vulnerability assessment. This means-
• identify and discuss vulnerabilities and threats
• develop a prioritized strategy to deal with the 3 or 4 most serious threats and vulnerabilities
• identify and classify security measures and corresponding network equipment, software and procedures for addressing the threats and vulnerabilities (e.g., firewalls, proxy servers, key management, identity management, content filtering, anti-virus management, patch management, token administrator, certificate authority, DMZ),
• discuss security policies needed to address the threats and vulnerabilities and which support the security measures