NGOKAN – ATTENTION PROJECT 3 – ASSESSING INFORMATION SYSTEM VULNERABILITY AND RISK MITIGATION – I WILL DO THE LAB, JUST NEED HELP WITH THE SAR and RAR (reports) Intro video on the deliverables is here https://youtu.be/rStxKMeGXAI Please select part of your references from this below. http://resources.sei.cmu.edu/library/ SEE ATTACHED DOCUMENTS FOR READING AND REFERENCE The deliverables for this project are as follows: Security Assessment Report (SAR): This should be an 8-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations. 2. Risk Assessment Report (RAR): This report should be a 5-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations. Please select part of your references from this below. http://resources.sei.cmu.edu/library/ Pick an organization of your choice (pick from any sector, be creative) 1. Security Assessment Report (SAR) with the following sections: please pay attention to details of the ENTIRE requirements (use figures, tables and diagrams where applicable) · Organizational Background Describe the background of the organization you have picked Purpose Describe purpose of the assessment (refer to the incident of OPM below in the transcript) Organizational structure o Describe the organizational structure, the network system description, and a diagram of the organization. (Please insert this diagram) Include LAN, WAN, and systems in diagram format ( use the OPM systems model of LAN side networks) , the intra-network, and WAN side networks, the Internet. Identify the boundaries that separate the inner networks from the outside networks. o include a description of how these platforms are implemented in your organization: common computing platforms, cloud computing, distributed computing, centralized computing, secure programming fundamentals. (cite reference) o What insider threats are a risk to your organization o differentiate between the external threats to the system and the insider threats. Identify where these threats can occur in the previously created diagrams. (cite reference) o Define threat intelligence, and explain what kind of threat intelligence is known about the OPM breach. Relate the OPM threat intelligence to your fictitious organization. How likely is it that a similar attack will occur at your organization? (cite reference) Scope Describe the scope of the assessment Methodology (cite references) o Use a suite of security tools, techniques, and procedures that can be used to assess the security posture of your organization’s network in a SAR. o identify the security issues in your fictitious organization’s networks. You have already used password cracking tools to crack weak and vulnerable passwords. o Provide an analysis of the strength of passwords used by the employees in your organization. Are weak passwords a security issue for your organization? o examine security tool resources on firewalls and auditing–RDBMS related to the use of the Relational Database Management System (i.e., the database system and data) RDBMS. Also review these resources related to access control. o Determine the role of firewalls and encryption, and auditing – RDBMS that could assist in protecting information and monitoring the confidentiality, integrity, and availability of the information in the information systems. o Reflect any weaknesses found in the network and information system diagrams previously created, as well as in the developing SAR. o Which of the following types of threats and attack techniques are a risk to your organization; IP address spoofing/cache poisoning attacks, denial of service attacks (DoS), packet analysis/sniffing, session hijacking attacks, distributed denial of service attacks o In identifying the different threats: 1. Identify the potential hacking actors of these threat attacks on vulnerabilities in networks and i…

Looking for solution of this Assignment?

WHY CHOOSE US?

We deliver quality original papers

Our experts write quality original papers using academic databases.  

Free revisions

We offer our clients multiple free revisions just to ensure you get what you want.

Discounted prices

All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount

100% originality

We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity

On-time delivery

We will deliver your paper on time even on short notice or  short deadline, overnight essay or even an urgent essay