Part 1: Current Security Threats Overall Scenario Aim Higher College

 

Part 1: Current Security Threats 

Overall Scenario
Aim Higher College is a fictitious institution located in the United States. The college offers undergraduate and graduate courses in domains, such as business management, information security, and nursing. Imagine that you have a new job at Aim Higher College as an information security analyst. Throughout this course, you will analyze the threats and vulnerabilities of Aim Higher College and recommend controls to secure the college’s information systems.

Scenario
It is your first day at the job in the information security department, and you are called for a meeting. In the meeting the need for strengthening the information security for the college is discussed, and everyone agrees that the first step in this direction is to identify the top five threats that are a potential risk to Aim Higher College.
The college’s administrative staff and faculty run the latest version of Microsoft Windows on their primary workstations, whereas students’ laptops may run Windows or macOS. The college’s web servers run on Linux; however, all other servers are Windows Server-based. Student, staff, and faculty mobile devices, such as tablets and smartphones, run on iOS or Android; all mobile devices can connect to the campus network.

Tasks
You have been given the responsibility to determine the top five threats that Aim Higher College faces. You asked your supervisor for support in this task and he gave you the following resources that might be useful in your research and analysis:
 Microsoft Security Advisories and Bulletins (https://docs.microsoft.com/en-us/security-updates/)
 Common Vulnerabilities and Exposure (CVE) database search (http://cve.mitre.org/find/index.html)
 Security organizations, such as Secunia (http://secunia.com/)

Your supervisor has also asked you to consider the following questions as you shortlist the threats:
 What threats are new this year, and which have become more prevalent?
 Why are these threats more common and why are they important?
 What threats remain constant from year to year? Why?
 What threats do you believe will become more critical in the next 12 months? Why?
 What is the likelihood of an exploit affecting Aim Higher College, and which operating system(s) does it target?

With these considerations in mind, write a summary report of the top five threats to Aim Higher College. Briefly explain why you have selected them and what effect they might have on the institution or its students, employees, graduates, or other communities on campus.

Part 2: Identify Vulnerabilities in IT Security  

Overall Scenario
Aim Higher College is a fictitious institution located in the United States. The college offers undergraduate and graduate courses in domains, such as business management, information security, and nursing. Imagine that you have a new job at Aim Higher College as an information security analyst. Throughout this course, you will analyze the threats and vulnerabilities of Aim Higher College and recommend controls to secure the college’s information systems.

Scenario
Aim Higher College has been the target of focused attacks from a variety of attackers. Your manager has assigned you the task to review the port and vulnerability scan data recently gathered from a typical system to determine what ports and services are exposed to attackers, and what vulnerabilities exist on that system.

Required Resources
 Access to the Internet
 Text sheet: Zenmap Intense Scan Results pdf file (hacking_ts_zenmapscan.pdf Download hacking_ts_zenmapscan.pdf)

Tasks

1. Analyze the results of the Zenmap scan. Your report must answer the following questions:
 What are the first five open ports as identified by the Zenmap scan?
 Include the port number
 Include the service name
 Include a brief description of how each is used

2. The Nessus scan identified two critical vulnerabilities, identified as ID 32314 and ID 33850.
 Research the vulnerabilities against the Common Vulnerabilities and Exposure (CVE) database .
 Include the name and a brief description of each vulnerability.

3. Determine what can be done to protect the system and defend the campus network against attempts to gather data, and to resolve vulnerabilities. Also determine which ports and services likely need to remain open.

4. Write a report targeted at IT management and systems administration staff explaining the vulnerabilities and protection mechanisms that Aim Higher College should adopt, which will be applied to all similar systems at the college.

  

Submission Requirements for both parts of the project:

  • Format: Microsoft Word
  • Font: Arial, 12-Point, Double-Space
  • Citation Style: APA
  • Length: Each part should have a minimum of 3 pages. So overall report size should be a minimum of 6 pages (excluding title page and bibliography).

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

(1) Composition and Benefits. 5-7 slides with speaker notes of

(1) Composition and Benefits. 5-7 slides with speaker notes of 200-250 words per slide (excluding title and reference  Determining the value of work is critical to setting pay rates. After the job analysis and writing the job description, the human resources compensation specialist determines the process to apply to perform

In this discussion, you’ll describe a patient with a mood

  In this discussion, you’ll describe a patient with a mood disorder and the appropriate nursing interventions. Please answer the following questions in your initial posting: Describe a client from your clinical setting or previous experience who experienced depression or mania. Include a brief history and 3-5 most pertinent medications.

How many bureaucracies do you interact with on a regular

How many bureaucracies do you interact with on a regular basis? What is the role of bureaucracy in domination and control of people? Are there any positive features of bureaucracy? Are there changes that could be made to improve the way bureaucracies work and to make them more “human?” Would

Make a conclusion about the BOD structure and the benefits

 Make a conclusion about the BOD structure and the benefits of the structure. What is the value create by the structure. Like if the directors are widely enough and each one has his own professional backgrounds, then the board of directors have boarder range of skills to help company to

12.1 What are the origins of the object-oriented approach? 12.7

12.1 What are the origins of the object-oriented approach? 12.7 What is the difference between persistent and transient objects? How is persistence handled in typical OO database systems? 12.21 What is meant by the type orthogonality of OQL? Chapter 13 # 13.3  What are the differences between the use of

I need the following questions answered in 200 words for

I need the following questions answered in 200 words for each DQ. Please provide references at the end of each DQ question. MODULE 1 DQ1 Identify what you feel are the two main potential risks or challenges that you may run into when making financial decisions over a 3-year period.

Please complete this assignment after watching The 13th. Answer the

  Please complete this assignment after watching The 13th. Answer the following questions using complete sentences and appropriate grammar, punctuation and spelling. Each question should have at least 2 sentences in order to be answered fully. What are three major policies that are discussed in the documentary that have contributed

A critical analysis of Rene Descartes Meditations I and II

Guidelines for this paper… What does “critical analysis” mean? Each of the readings listed above contains at least one core argument for some position either epistemology of philosophy of religion. You are to give a critical analysis of this argument, which involves doing three things: 1) providing an analysis of

Development Across the Lifespan

 (PLO 5 – Life Span Development: Understand and apply the major theories related to the entire lifespan from conception through childhood, adolescence, young adulthood, middle-age, and late adulthood.) a 12-page paper analyzing a famous person from early childhood to late adulthood which will examine how adult developmental theories apply to

http://www.youtube.com/watch?v=HatSl1lu_PM&feature=relatedhttp://www.youtube.com/watch?v=lqaqrDnhzDw (If the links do not work by clicking on

 http://www.youtube.com/watch?v=HatSl1lu_PM&feature=relatedhttp://www.youtube.com/watch?v=lqaqrDnhzDw (If the links do not work by clicking on it, highlite, copy, and paste the link to your browser address bar).Design a restorative justice program in a school in your area. You may use a real or perceived problem. Discuss the following: Describe the setting including the problem and causes

Discussion Question: What did you find particularly exciting, interesting, or

Discussion Question: What did you find particularly exciting, interesting, or challenging about the assigned content this week?  Please remember to cite all of the required content in your post. You should be integrating a discussion of both the lecture AND the reading in your discussion post. Always include in-text MLA

Find a dataset (must have multiple columns with data at

Find a dataset (must have multiple columns with data at the interval or ratio measurement level), and examine and test the relationships between several variables. Provide the R codes in the R-script file under the sub-heading Module 5, and the statistical outputs under the sub-heading “Module 5” in the Word

Strengths and Weaknesses of the Latter Day Saints

This criterion is linked to a Learning Outcome Clear thesis statement at the end of a well-written and appropriate introduction 20.0 pts Strong thesis and intro 10.0 pts Vague thesis statement 0.0 pts No thesis statement; weak intro paragraph This criterion is linked to a Learning Outcome Organization: Paragraph division

1. In the reading it states that “increments in strength

1. In the reading it states that “increments in strength training volume depend on the athlete’s biological makeup, the specifics of the sport, and the importance of strength in that sport;” therefore, with this in mind, what are some other things that need to be taken into consideration when designing

Imagine you are trying to sell season tickets to your

  Imagine you are trying to sell season tickets to your local ballpark. After you present the product to your prospects, a middle-aged married couple, they tell you they are very interested but are concerned they might be out of town on some of the weekends when there are home

Using the Obeng video found in Chapter 3 and as

  Using the Obeng video found in Chapter 3 and as part of Toolkit Exercise 3.1 in your Organizational Change: An Action-Oriented Toolkit text, respond to the following: How can you and your organization begin to view failure as learning more often? Include points of view from other authors as

System Security Goals

Description Critical Thinking: System Security Goals (60 points) Assignment Details: In an essay, answer the following questions based on this week’s module: How do you know if your system is meeting your security goals? You can verify that controls are working, but how do you know if they are getting