information security sssss

0 comments

 

 

 

 

 

Assume that you are the lead network security expert in your organization. Because of the recent rise in web security issues and the development of the global marketplace, your organization has decided to hire additional network security technicians. Once hired, you are to give a report to these individuals designed to illustrate holes in current security countermeasures, along with ways in which these holes can be filled. In your report, ensure you address the areas mentioned below:

·         An explanation of which web security threats are most prevalent, the hazards they present, and how these threats are exploiting holes in current security countermeasures

·         An explanation of the actions that should be taken to prevent existing web security countermeasures from being exploited

·         An assessment of the pros and cons of choosing to implement measures such as firewalls, access control measures, and cryptographic systems

 

 

Guidelinesand Rubric

 

For theModuleEightassignment,students will assumetherole of leadnetwork securityadministratorwithinan organization.Studentswill then berequiredto provideinstructionpertainingtoidentifyingholesin securitycountermeasures to newlyhirednetwork securitytechnicians.Thisprovides studentswith experienceinnotonlyevaluatingvulnerabilities inanetwork,butalsoconveyingthis knowledgetosubordinates.Thesearevaluable skills thatwill beneededin ordertodesignan informationassuranceplanandultimatelyexplainitsintenttomembersof theorganization.

 

Prompt: Assumethatyouaretheleadnetworksecurityexpertin yourorganization.Because ofthe recentrisein websecurityissues andthedevelopment of the global marketplace, yourorganizationhas decidedtohireadditional networksecuritytechnicians.Oncehired, youaretogivea reporttotheseindividuals designedtoillustrateholesincurrentsecuritycountermeasures, alongwith waysinwhichtheseholes canbefilled.Inyour report, ensureyouaddressthe areas mentionedbelow:

 

·    An explanation ofwhichweb security threats are mostprevalent,the hazards theypresent,andhowthese threats areexploiting holes incurrentsecurity countermeasures

·    An explanation oftheactions thatshouldbetaken to preventexisting web securitycountermeasures frombeing exploited

·    Anassessmentofthe prosandcons ofchoosingtoimplementmeasuressuchasfirewalls, access controlmeasures, andcryptographic systems

 

Guidelinesfor Submission:Yourresponsesfor eachpromptmustbesubmittedastwoto threeparagraphs andas a MicrosoftWorddocumentwith double spacing, 12pointTimes NewRomanfont,one-inchmargins, andatleastthreesourcescitedin APA format.

 

InstructorFeedback: This activityuses an integratedrubric inBlackboard. Students canviewinstructorfeedbackintheGradeCenter. Formoreinformation, review theseinstructions.

 

CriticalElements

Exemplary(100%)

Proficient(85%)

NeedsImprovement(55%)

NotEvident(0%)

Value

Threats

MeetsProficient”criteriaand thethreatdescribeduses contentbasedvocabularyand researchbasedevidenceto supporttheanswer

Identifieswhichweb security threatsaremostprevalent

Submissionidentifiesweb securitythreatsbutnotthe mostprevalent,orthe submissionisnotsupportedby scholarlyevidence

Submissiondoesnotidentifyor explainprevalentwebsecurity threats

20

Hazards

MeetsProficient”criteriaand

theexplanationofthehazards usesresearchbasedevidenceto supportwhatsecuritythreats thehazardspresent

Explainsthehazardsthatweb

securitythreatspresent

Submissionsuggeststhehazards

thatwebsecuritypresentstoa network,butdoesnotexplain thehazards

Submissiondoesnotexplainthe

hazardsthatwebsecurity threatspresenttoa network

15


 

Exploitations

MeetsProficient”criteriaand

theexplanationofhowthreats areexploitingholesincurrent securitycountermeasuresis substantiatedby researchbased evidencetosupporttheanswer

Explainshowtheidentified

threatsarepresentlyexploiting holesin currentsecurity countermeasures

Submissionexplainshowthe

identifiedthreatsareexploiting holesincurrentsecurity countermeasuresbutdoesnot use contentbasedvocabularyto doso

Submissiondoesnotexplain

howtheidentifiedthreatsare exploitingholesinsecurity countermeasures

20

PreventativeActions

MeetsProficient”criteriaand

thedescriptionofthestepsthat

shouldbetakentopreventweb securitycountermeasuresfrom beingexploitedusescontent basedvocabularyand research basedevidencetosupportthe answer

Explainsthestepsthatshould

betakentopreventexisting

web securitycountermeasures frombeingexploited

Submissiondoesnotuse

researchbasedevidenceto

supportthestepsthatneedto betakentopreventexisting web securitycountermeasures frombeingexploited

Submissiondoesnotexplainthe

stepsthatshouldbetakento

preventexistingwebsecurity countermeasuresfrombeing exploited

15

ProsandCons

MeetsProficient”criteriaand

theexplanationofboththepros

andtheconsissupportedby contentbasedvocabularyand researchbasedevidenceto supporttheanswer

Assessestheprosand consof

choosingtoimplement

measuressuchasfirewalls, accesscontrolmeasures,and cryptographicsystems

Submissionaddresseseitherthe

prosortheconsofchoosingto

implementmeasuressuchas firewalls,butdoesnotexplain or assessboth

Submissionaddressesneither

theprosnortheconsof

choosingtoimplement measuressuchasfirewalls, accesscontrolmeasures,and cryptographicsystems

20

Articulationof

Response

Submissionisfreeoferrors

relatedtocitations,grammar, spelling,syntax,and organizationandispresentedin a professionalandeasytoread format

Submissionhasnomajorerrors

relatedtocitations,grammar, spelling,syntax,ororganization

Submissionhasmajorerrors

relatedtocitations,grammar, spelling,syntax,ororganization thatnegativelyimpact readabilityandarticulationof mainideas

Submissionhascriticalerrors

relatedtocitations,grammar, spelling,syntax,ororganization thatpreventunderstandingof ideas

10

EarnedTotal

100%

 

 

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}