Intro to information assurance & security- threats, attacks, and | CMGT400 Intro To Information Assurance & Security | University of Phoenix

Category: Information System

  

Part A:

Select an organization (CAPITAL ONE) you wish to explore and use throughout the course.

As you make your selection, keep in mind that you will explore the following roles in the organization: Cyber Security Threat Analyst, Penetration Tester, Cyber Security Engineer, Risk Management Analyst, and Software Engineer. You need sufficient knowledge of the organization you select to complete these security assignments.

Part B:

A Cyber Security Threat Analyst conducts analysis, digital forensics, and targeting to identify, monitor, assess, and counter cyber-attack threats against information systems, critical infrastructure, and cyber-related interests.

Take on the role of a Cyber Security Threat Analyst for the organization you select. Use the Attached Template to create a 3- to 4-page assessment document.

Research and include the following:

· Tangible assets:

· Include an assessment scope. The scope must include virtualization, cloud, database, network, mobile, and information systems.

· Asset descriptions:

· Include a system model, diagram, and descriptions of each asset included in the assessment scope and existing countermeasures already in place. (Microsoft® Visio® or Lucidhart®)

· Threat agents and possible attacks

· Exploitable vulnerabilities

· Threat history

· Evaluation of threats or impact of threats on the business

· A prioritized list of identified risks

· Countermeasures to reduce threat

APA FORMAT

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Pay Someone To Write Essay