This project requires that you describe an information security environment and discuss 2 threats that exist in that environment. You will discuss the two vulnerabilities that exist and how you are going to mitigate or fix them. Finally, you will discuss the policies, equipment, etc that will be put in place and how it fixed the problem. This should be a real environment and threats, one that exists in real life, but you do not have to be currently part of it. PART 1 This must be at least a ONE PAGE introduction to the environment and the threats. This would describe details of the environment like where it is located, how things are arranged, the current information security setup, the current computer network topology, people, data, hardware, software, what they do if they are a company or organization, the IT department, what are the threats, how they can it be exploited, who can exploit them, are they internal threats, external threats, etc. PART 2 This must be at least a IWO PAGE detailed description of the environment as well as the threats themselves. All of the details and specifications of the threats and or vulnerabilities should be described. A table is to be created in WORD and the specifications should be placed into the table. The table does not need to take up a full page but has to be at least part of a page. Please be as detailed as you can. All of your research is to be done using the Internet. All supporting documentation is to be printed out, labeled, and attached to the back of your report. This documentation would be any research information that you found on the Internet. It could be information about the threat, policies, vulnerability, the mitigation, etc

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question
This project requires that you describe an information security environment and discuss 2 threats that exist in that
environment. You will discuss the two vulnerabilities that exist and how you are going to mitigate or fix them. Finally,
you will discuss the policies, equipment, etc that will be put in place and how it fixed the problem. This should be a real
environment and threats, one that exists in real life, but you do not have to be currently part of it.
PART 1
This must be at least a ONE PAGE introduction to the environment and the threats. This would describe details of the
environment like where it is located, how things are arranged, the current information security setup, the current
computer network topology, people, data, hardware, software, what they do if they are a company or organization, the
IT department, what are the threats, how they can it be exploited, who can exploit them, are they internal threats,
external threats, etc.
PART 2
This must be at least a TWO PAGE detailed description of the environment as well as the threats themselves. All of the
details and specifications of the threats and or vulnerabilities should be described. A table is to be created in WORD
and the specifications should be placed into the table. The table does not need to take up a full page but has to be at
least part of a page. Please be as detailed as you can. All of your research is to be done using the Internet. All supporting
documentation is to be printed out, labeled, and attached to the back of your report. This documentation would be any
research information that you found on the Internet. It could be information about the threat, policies, vulnerability, the
mitigation, etc..
Transcribed Image Text:This project requires that you describe an information security environment and discuss 2 threats that exist in that environment. You will discuss the two vulnerabilities that exist and how you are going to mitigate or fix them. Finally, you will discuss the policies, equipment, etc that will be put in place and how it fixed the problem. This should be a real environment and threats, one that exists in real life, but you do not have to be currently part of it. PART 1 This must be at least a ONE PAGE introduction to the environment and the threats. This would describe details of the environment like where it is located, how things are arranged, the current information security setup, the current computer network topology, people, data, hardware, software, what they do if they are a company or organization, the IT department, what are the threats, how they can it be exploited, who can exploit them, are they internal threats, external threats, etc. PART 2 This must be at least a TWO PAGE detailed description of the environment as well as the threats themselves. All of the details and specifications of the threats and or vulnerabilities should be described. A table is to be created in WORD and the specifications should be placed into the table. The table does not need to take up a full page but has to be at least part of a page. Please be as detailed as you can. All of your research is to be done using the Internet. All supporting documentation is to be printed out, labeled, and attached to the back of your report. This documentation would be any research information that you found on the Internet. It could be information about the threat, policies, vulnerability, the mitigation, etc..
PART 3
Must be at least a ONE PAGE summary containing the conclusion of the paper. You should explain how you will
mitigate the threats and what policies, equipment, controls, etc will be put in place and how they will work to fix the
problem. Also include a Work Cited list of any URLs that you used on the Internet as sources.
Additional requirements for this assignment:
1. The paper MUST be typed in WORD
2. The first page must be a cover page containing your name, course name, course number, course section, and a
graphic. It can be as simple as using clipart
3. Use 1-inch margins, double-spaced, with Times New Roman, 12 point for all pages except the title page. Include
page numbering in the lower right-hand corner. Also include a staple in the upper left-hand corner. Include all
supporting documentation and it must be labeled
4. The content of your research as well as grammar and sentence construction will count towards your grade
5. Include a table constructed in WORD to describe the environment and the threat specifications
Transcribed Image Text:PART 3 Must be at least a ONE PAGE summary containing the conclusion of the paper. You should explain how you will mitigate the threats and what policies, equipment, controls, etc will be put in place and how they will work to fix the problem. Also include a Work Cited list of any URLs that you used on the Internet as sources. Additional requirements for this assignment: 1. The paper MUST be typed in WORD 2. The first page must be a cover page containing your name, course name, course number, course section, and a graphic. It can be as simple as using clipart 3. Use 1-inch margins, double-spaced, with Times New Roman, 12 point for all pages except the title page. Include page numbering in the lower right-hand corner. Also include a staple in the upper left-hand corner. Include all supporting documentation and it must be labeled 4. The content of your research as well as grammar and sentence construction will count towards your grade 5. Include a table constructed in WORD to describe the environment and the threat specifications
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 4 steps

Blurred answer
Knowledge Booster
Maintenance
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education