The purpose of this assignment is to implement vulnerability and

The purpose of this assignment is to implement vulnerability and risk assessment techniques to justify implementation and enforcement of security policies.

Part 1:

For this assignment you will need to install the Belarc Advisor by going to the Belarc website and following the instructions provided in the “Belarc Installation, Saving, and Uploading Instructions” resource. Instructions for saving and uploading the assignment files are also included in this document. In step 10 you will complete a local system scan of your computer.

Note: If your computer utilizes an operating system other than Windows 7, Vista, or XP Pro, you will need to use the “Summary” file to complete the topic assignment rather than the local system scan outlined in step 10 of the “Belarc Installation, Saving, and Uploading Instructions.”

Use the results of the local system scan to compose a 300-word paper that discusses each section’s role in securing or protecting the scanned system. Expand each section to identify how the system passed or failed the various policies. For each section, address the following:

Identify the section and explain why the system passed or failed.

Explain the risks identified from the results.

Discuss how a threat could exploit the risks and impact the system.

Explain how the failed policies can be solved.

Part 2:

Using the “Risk Assessment Template,” list 20 risks in the “Risk” column. The risks should be failed items from the Belarc Advisor results. Complete the remaining spreadsheet columns for each identified risk. The spreadsheet must include the following:

Risk Title: Obtained from the Belarc Advisor report.

Description: Summarize the information obtained from the Belarc Advisor report hyperlink (pop-up window).

Vulnerability: Explain the vulnerability associated with this risk.

Threat: Identify potential threats that can exploit this vulnerability.

Current Safeguards: Identify if any policies or best practices are in place to reduce the likelihood the threat will be successful.

Impact: Describe the impact if threat is successful.

Severity: Measure the overall severity of the exploitation or impact.

Likelihood: Measure the likelihood a threat will be successful.

Risk Value: Measure the overall value of the risk (low = no real value is exploited; medium = dangerous if exploited; high = extremely grave if exploited).

Submit the 300-word paper, Belarc Advisor results (.xps or .pdf), and completed “Risk Assessment Template.”

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion. 

You are not required to submit this assignment to LopesWrite.

Benchmark Information

This benchmark assignment assesses the following programmatic competencies:

MS Information Technology Management

1.5: Evaluate system risks, threats, and vulnerabilities and practices and processes to ensure the safety and security of business information systems.

MS Information Assurance and Cybersecurity

3.2: Evaluate system risks, threats, and vulnerabilities and practices and processes to ensure the safety and security of business information systems.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Multivariate Approaches

 In preparation for this assignment, read the “Maladaptive Perfectionism as a Mediator and Moderator Between Adult Attachment and Depressive Mood” article located in the Topic 3 readings. Write a 750-1,000-word paper about your selected article. Be sure to include the following in your paper: 1.A discussion about the key variables

This week, we will have two case studies: Pray with

 This week, we will have two case studies: Pray with Me Conflict of Interest These case studies will cover topics on healthcare professionals and human resources, healthcare disparities, cultural competence, ethics law, and conflict of interest. You will have the opportunity to discuss a case among your fellow students and

Assignment – Construction of Clinical/Practice Question and Literature Requires 8

Assignment — Construction of Clinical/Practice Question and Literature Requires 8 full pages and 10-12 references within the last 5 years only. SEE FULL DETAILS ATTACHED Prompt: The purpose of this assignment is to state your clinical/practice question and explore the literature pertaining to your clinical/practice problem as you described in

criminology: Serial killer TED BUNDY

SERIAL KILLER ESSAY: Your essay will be evaluated on the following; 1. How many victims the killer is believed to have murdered. 2. Their modus operandi. 3. Their motivation. 4. Their psychiatric diagnosis, if any. 5. How they came to be apprehended by Police. • Your essay will analyze one

Question 1 a. Define the Bullwhip Effect. [5 marks] b.

Question 1a. Define the Bullwhip Effect.[5 marks] b. Illustrate the approaches to deal with bullwhip effects with suitable examples.[20 marks] Question 2a. Compare the traditional supply chain and modern world supply chain.[10 marks] b. Develop the Value Chain Framework for an automotive manufacturer and explaineach function.[15 marks] Question 3Reverse logistics

The American Dream lecture in Week 1 points out that

   The American Dream lecture in Week 1 points out that Poor Richard’s Almanac was an annual publication that included calendar lists, home recipes, weather forecasts, etc. What made Franklin’s almanac unlike other almanacs was the inclusion of Franklin’s witty parables and humorous writings. The maxims below relate to Franklin’s

Developing as a professional and as a leader is a

 Developing as a professional and as a leader is a lifelong journey that requires careful reflection, concentrated attention, and dedication to learning not only who you are currently as a leader, but what your leadership goals are. This process requires taking careful inventory of your values and guiding principles, as

The Epic of Gilgamesh

 Examine Enkidu’s curse of Shamhat when he is dying (Tablet 7). Did Shamhat wrong him as he claims? Was it good that he became civilized? Why or why not? Why does he blame Shamhat more than Gilgamesh? Is this despair in the face of death? Use multiple examples and explanations

Identify and explain at least two objections to cultural relativism.

What is cultural relativism? Using a clear example of a social practice our society (or the majority in our society) would disagree with (you can use an example from our readings or come up with one of your own), explain how a cultural relativist would respond to this example. Identify

Please make a reply to this student post adding something extra of

Please make a reply to this student post adding something extra of what the student already did. APA references and less than 20 % similarity Illegal and unethical- Based on both the utilitarianism principle and deontological theories, abortion is unethical as it involves the destruction of life. Legal but unethical

Review the NCAA Drug Testing Policy and information at http://www.ncaa.org/sport-science-institute/ncaa-drug-testing-program.

  Review the NCAA Drug Testing Policy and information at http://www.ncaa.org/sport-science-institute/ncaa-drug-testing-program.  What are the responsibilities of the Year-Round Drug Testing Site Coordinator?  From these policies and responsibilities, is there any discretion left to the institution or is it cut and dry?  Finally, what are the procedures for receiving an exception

There are dozens of internet resources that will help you

  There are dozens of internet resources that will help you with getting additional money. And sometimes they can deliver you positive feelings but sometimes they can ruin your week and make your day so bad. When you wanted to find one of those service you will go to your

Network Threats and Attacks Subscribe You have now learned about

  Network Threats and Attacks  Subscribe You have now learned about recognizing security threats, vulnerabilities, and how to mitigate them. Almost every day, there are reports of an intrusion, breach of confidentiality, or some other high-profile attack. Find a news article about a recent network attack (no more than one

explain how Julie might reconcile her dilemma. _________________________________________________________________________________ Cognitive Dissonance

explain how Julie might reconcile her dilemma. _________________________________________________________________________________ Cognitive Dissonance Theory would be apropos to explaining Julie’s dilemma. In cognitive dissonance theory, when your external actions or behavior do not reflect your internal mores and beliefs, it causes dissonance between your internal and external self that leads to discomfort, and

The first part of this assignment is to construct a

The first part of this assignment is to construct a spreadsheet of all the ratios (attached) for a publicly-traded company you have chosen to research. You will calculate the last 3 years for your company and the previous 3 years for a primary competitor for each ratio.    The second