Upload Assignment: Project Part 1-task 1 - Threats-vulnerabilities Assignment

projection office i amp 2 – coursefighter.com

project part i amp 2 – coursefighter.com

Project Part 1: Current Security Threats

Scenario

It is your outset day at the job in the information security department, and you lot are called for a meeting. In the meeting the demand for strengthening the data security for the University is discussed, and everyone agrees that the first step in this direction is to place the elevation 5 threats that are a potential risk to Marymount University.

The Universities authoritative staff and faculty run the latest version of Microsoft Windows on their primary workstations, whereas students’ laptops may run Windows or macOS. The college’s spider web servers run on Linux; however, all other servers are Windows Server-based. Student, staff, and faculty mobile devices, such as tablets and smartphones, run on iOS or Android; all mobile devices tin connect to the campus network.

Tasks

You accept been given the responsibility to determine the elevation five threats that Marymount University faces. You asked your supervisor for support in this task and he gave you the following resources that might be useful in your research and analysis:

  • Microsoft Security Advisories and Bulletins (https://docs.microsoft.com/en-u.s.a./security-updates/)
  • Common Vulnerabilities and Exposure (CVE) database search (http://cve.mitre.org/find/index.html)
  • Security organizations, such every bit Secunia (http://secunia.com/)

Your supervisor has also asked yous to consider the following questions as y'all shortlist the threats:

  • What threats are new this year, and which have become more prevalent?
  • Why are these threats more common and why are they of import?
  • What threats remain constant from year to year? Why?
  • What threats do you believe volition become more than critical in the next 12 months? Why
  • What is the likelihood of an exploit affecting Marymount University, and which operating system(south) does it target?

With these considerations in mind, write a summary report of the top five threats to Marymount Academy'southward President Dr. Irma Becerra. Briefly explain why y'all have selected them and what upshot they might accept on the establishment or its students, employees, graduates, or other communities on campus.

Submission Requirements

Format: Microsoft Word (or compatible)

Font: Times New Roman, size 12, double-space

Citation Style: APA

Length: 2 to 3 pages (without citations)

Project Part 2: Identify Vulnerabilities in Information technology Security

Scenario

Marymount Academy has been the target of focused attacks from a variety of attackers. Your manager, Professor Pendleton has assigned you the job to review the port and vulnerability browse data recently gathered from a typical system to determine what ports and services are exposed to attackers, and what vulnerabilities be on that organisation.

Required Resource

Access to the Internet

Text canvas: Zenmap Intense Scan Results Preview the document

Tasks

1. Analyze the results of the Zenmap scan. Your study must answer the following questions:

What are the first five open up ports equally identified by the Zenmap scan?

Include the port number

Include the service proper noun

nclude a brief clarification of how each is used

two. The Nessus scan identified two critical vulnerabilities, identified every bit ID 32314 and ID 33850.

Inquiry the vulnerabilities against the Common Vulnerabilities and Exposure (CVE) database.

Include the proper name and a brief clarification of each vulnerability.

3. Decide what can be done to protect the system and defend the campus network against attempts to get together information, and to resolve vulnerabilities. Also determine which ports and services likely need to remain open up.

4. Write a report targeted at Information technology management and systems administration staff explaining the vulnerabilities and protection mechanisms that Aim Higher College should adopt, which will be applied to all similar systems at the higher.

Submission Requirements

Format: Microsoft Give-and-take (or uniform)

Font: Times New Roam, size 12, double-infinite

Citation Fashion: APA

Length: 2 to 4 pages

Course Fighter

barnetttennesers.blogspot.com

Source: https://coursefighter.com/blog/project-part-1-amp-2-coursefighter-com/

Belum ada Komentar untuk "Upload Assignment: Project Part 1-task 1 - Threats-vulnerabilities Assignment"

Posting Komentar

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel