Assume that you are the lead network security expert in your organization. Because of the recent rise in web security issues and the development of the global marketplace, your organization has decided to hire additional network security technicians. Once hired, you are to give a report to these individuals designed to illustrate holes in current security countermeasures, along with ways in which these holes can be filled. In your report, ensure you address the areas mentioned below:
· An explanation of which web security threats are most prevalent, the hazards they present, and how these threats are exploiting holes in current security countermeasures
· An explanation of the actions that should be taken to prevent existing web security countermeasures from being exploited
· An assessment of the pros and cons of choosing to implement measures such as firewalls, access control measures, and cryptographic systems
Guidelinesand Rubric
For theModuleEightassignment,students will assumetherole of leadnetwork securityadministratorwithinan organization.Studentswill then berequiredto provideinstructionpertainingtoidentifyingholesin securitycountermeasures to newlyhirednetwork securitytechnicians.Thisprovides studentswith experienceinnotonlyevaluatingvulnerabilities inanetwork,butalsoconveyingthis knowledgetosubordinates.Thesearevaluable skills thatwill beneededin ordertodesignan informationassuranceplanandultimatelyexplainitsintenttomembersof theorganization.
Prompt: Assumethatyouaretheleadnetworksecurityexpertin yourorganization.Because ofthe recentrisein websecurityissues andthedevelopment of the global marketplace, yourorganizationhas decidedtohireadditional networksecuritytechnicians.Oncehired, youaretogivea reporttotheseindividuals designedtoillustrateholesincurrentsecuritycountermeasures, alongwith waysinwhichtheseholes canbefilled.Inyour report, ensureyouaddressthe areas mentionedbelow:
· An explanation ofwhichweb security threats are mostprevalent,the hazards theypresent,andhowthese threats areexploiting holes incurrentsecurity countermeasures
· An explanation oftheactions thatshouldbetaken to preventexisting web securitycountermeasures frombeing exploited
· Anassessmentofthe prosandcons ofchoosingtoimplementmeasuressuchasfirewalls, access controlmeasures, andcryptographic systems
Guidelinesfor Submission:Yourresponsesfor eachpromptmustbesubmittedastwoto threeparagraphs andas a MicrosoftWorddocumentwith double spacing, 12–pointTimes NewRomanfont,one-inchmargins, andatleastthreesourcescitedin APA format.
InstructorFeedback: This activityuses an integratedrubric inBlackboard. Students canviewinstructorfeedbackintheGradeCenter. Formoreinformation, review theseinstructions.
|
CriticalElements |
Exemplary(100%) |
Proficient(85%) |
NeedsImprovement(55%) |
NotEvident(0%) |
Value |
|
Threats |
Meets“Proficient”criteriaand thethreatdescribeduses contentbasedvocabularyand researchbasedevidenceto supporttheanswer |
Identifieswhichweb security threatsaremostprevalent |
Submissionidentifiesweb securitythreatsbutnotthe mostprevalent,orthe submissionisnotsupportedby scholarlyevidence |
Submissiondoesnotidentifyor explainprevalentwebsecurity threats |
20 |
|
Hazards |
Meets“Proficient”criteriaand theexplanationofthehazards usesresearchbasedevidenceto supportwhatsecuritythreats thehazardspresent |
Explainsthehazardsthatweb securitythreatspresent |
Submissionsuggeststhehazards thatwebsecuritypresentstoa network,butdoesnotexplain thehazards |
Submissiondoesnotexplainthe hazardsthatwebsecurity threatspresenttoa network |
15 |
|
Exploitations |
Meets“Proficient”criteriaand theexplanationofhowthreats areexploitingholesincurrent securitycountermeasuresis substantiatedby researchbased evidencetosupporttheanswer |
Explainshowtheidentified threatsarepresentlyexploiting holesin currentsecurity countermeasures |
Submissionexplainshowthe identifiedthreatsareexploiting holesincurrentsecurity countermeasuresbutdoesnot use contentbasedvocabularyto doso |
Submissiondoesnotexplain howtheidentifiedthreatsare exploitingholesinsecurity countermeasures |
20 |
|
PreventativeActions |
Meets“Proficient”criteriaand thedescriptionofthestepsthat shouldbetakentopreventweb securitycountermeasuresfrom beingexploitedusescontent basedvocabularyand research basedevidencetosupportthe answer |
Explainsthestepsthatshould betakentopreventexisting web securitycountermeasures frombeingexploited |
Submissiondoesnotuse researchbasedevidenceto supportthestepsthatneedto betakentopreventexisting web securitycountermeasures frombeingexploited |
Submissiondoesnotexplainthe stepsthatshouldbetakento preventexistingwebsecurity countermeasuresfrombeing exploited |
15 |
|
ProsandCons |
Meets“Proficient”criteriaand theexplanationofboththepros andtheconsissupportedby contentbasedvocabularyand researchbasedevidenceto supporttheanswer |
Assessestheprosand consof choosingtoimplement measuressuchasfirewalls, accesscontrolmeasures,and cryptographicsystems |
Submissionaddresseseitherthe prosortheconsofchoosingto implementmeasuressuchas firewalls,butdoesnotexplain or assessboth |
Submissionaddressesneither theprosnortheconsof choosingtoimplement measuressuchasfirewalls, accesscontrolmeasures,and cryptographicsystems |
20 |
|
Articulationof Response |
Submissionisfreeoferrors relatedtocitations,grammar, spelling,syntax,and organizationandispresentedin a professionalandeasy–to–read format |
Submissionhasnomajorerrors relatedtocitations,grammar, spelling,syntax,ororganization |
Submissionhasmajorerrors relatedtocitations,grammar, spelling,syntax,ororganization thatnegativelyimpact readabilityandarticulationof mainideas |
Submissionhascriticalerrors relatedtocitations,grammar, spelling,syntax,ororganization thatpreventunderstandingof ideas |
10 |
|
EarnedTotal |
100% |
||||


0 comments