IT Threats and Vulnerabilities.Cyber Security

IT Threats and Vulnerabilities.Cyber Security

Objective: Assess the major types of threats that modern enterprises face with regard to cybersecurity and how effective policy can mitigate those threats. Evaluate

how an enterprise should implement long-term, strategic initiatives to promote cybersecurity.
Competencies: Critical thinking, communications skills
Individual Assignment #1
In 9-10 double-spaced pages, prepare a high level vulnerability assessment for their organization, which could be an entire organization or a unit of a larger

organization. Alternatively, you may opt to research another organization such as NASA. One interest might be in anticipation of interviewing with that organization

as the next step of their future career in cybersecurity policy.

• identify threats and vulnerabilities for a representative latest evolution of computing and networking system resources for a major organization,
• identify, classify, and prioritize security measures and corresponding network equipment, software and procedures for addressing the threats and

vulnerabilities (e.g., firewalls, proxy servers, key management, identity management, content filtering, anti-virus management, patch management, token administrator,

certificate authority, DMZ),
• discuss security policies needed to address the threats and vulnerabilities and which support the security measures, and
• develop a prioritized strategy to deal with the most serious threats and vulnerabilities.

The paper must be prepared in Microsoft Word. It should be double-spaced with one-inch margins all around.
The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines.
References are NOT included in the page count.

Order from us and get better grades. We are the service you have been looking for.