weekly report 2 2
Get perfect grades by consistently using our writing services. Place your order and get a quality paper today. Take advantage of our current 20% discount by using the coupon code GET20
Order a Similar Paper Order a Different Paper
The problem description defines the issue you are trying to address with your project.
- gives the overall description of the client’s business context
- identifies the assets that need to be protected
- analyzes the cybersecurity threats that the client needs to address (threats’ likelihood and impact are addressed).
- includes a detailed description of the current security posture of the client
It should clear and sufficiently precise:
Week 2 Homework (due 03/5/2020):
- I uploaded a Sample Problem Description II file on Blackboard.
- Please use it as an example of what I am expecting.
- Other remarks:
- The document should contain a threat analysis. A threat analysis is NOT a vulnerability analysis.
- A vulnerability is an actual weakness or flaw in an information system that can be exploited. Example: “OpenJPEG through 2.3.1 has a heap-based buffer overflowâ€.
- A threat is a potential negative event that can lead to damage or loss of an asset. Example: “Patient records are accessed by an unauthorized individualâ€.
- As a reminder, a threat actor is a person, organization, or an entity that will exploit an existing vulnerability. Common threat actors include: hacktivists, cybercriminals, disgruntled insiders, nation states, careless employees, nature.
- The list of identified threats should be exhaustive.
- Don’t worry: You will NOT have to provide countermeasures to each of the identified threats.
- Workloads: Each team member could be responsible for analyzing the threats against a specific asset.
- Each threat should be rated (impact and likelihood).
- Usually, cybersecurity professionals provide a qualitative assessment (Low/Medium/High) based on their personal experience.
- Most advanced techniques use quantitative methods.
- To help you identify your threats, I uploaded on Blackboard a few whitepapers about current threats. But keep in mind that the threats for your project depend on your business context and assets.
- Use your knowledge from previous cybersecurity classes when you brainstorm.
- The document should contain a threat analysis. A threat analysis is NOT a vulnerability analysis.
Do you need help with this or a different assignment? We offer CONFIDENTIAL, ORIGINAL (Turnitin/LopesWrite/SafeAssign checks), and PRIVATE services using latest (within 5 years) peer-reviewed articles. Kindly click on ORDER NOW to receive an excellent paper from our writers.
Get a 15% discount on your order using the following coupon code SAVE15
Order a Similar Paper Order a Different Paper