CYB610 Project 3: Common computing platforms

 

You are an Information Assurance Management Officer, IAMO, at an organization of your choosing. One morning, as you’re getting ready for work, you see an email from Karen, your manager. She asks you to come to her office as soon as you get in. When you arrive to your work, you head straight to Karen’s office. “Sorry for the impromptu meeting,” she says, “but we have a bit of an emergency. There’s been a security breach at the Office of Personnel Management.” We don’t know how this happened, but we need to make sure it doesn’t happen again, says Karen. You’ll be receiving an email with more information on the security breach. Use this info to assess the information system vulnerabilities of the Office of Personnel Management. At your desk, you open Karen’s email. She’s given you an OPM report from the Office of the

Inspector General, or OIG. You have studied the OPM OIG report and found that the hackers were able to gain access through compromised credentials. The security breach could have been prevented, if the Office of Personnel Management, or OPM, had abided by previous auditing reports and security findings. In addition, access to the databases could have been prevented by implementing various encryption schemas and could have been identified after running regularly scheduled scans of the systems. Karen and the rest of the leadership team want you to compile your findings into a Security Assessment Report or SAR. You will also create a Risk Assessment Report, or RAR, in which you identify threats, vulnerabilities, risks, and likelihood of exploitation and suggested remediation

 

The security posture of the information systems infrastructure of an organization should be regularly monitored and assessed (including software, hardware, firmware components, governance policies, and implementation of security controls). The monitoring and assessment of the infrastructure and its components, policies, and processes should also account for changes and new procurements that are sure to follow in order to stay in step with ever-changing information system technologies.

The data breach at the Office of Personnel Management (OPM) is one of the largest in US government history. It provides a series of lessons learned for other organizations in industry and the public sector. Some critical security practices, such as lack of diligence to security controls and management of changes to the information systems infrastructure were cited as contributors to the massive data breach in the OPM Office of the Inspector General’s (OIG) Final Audit Report, which can be found in open source searches. Some of the findings in the report include: weak authentication mechanisms; lack of a plan for life-cycle management of the information systems; lack of a configuration management and change management plan; lack of inventory of systems, servers, databases, and network devices; lack of mature vulnerability scanning tools; lack of valid authorizations for many systems, and lack of plans of action to remedy the findings of previous audits.

The breach ultimately resulted in removal of OPM’s top leadership. The impact of the breach on the livelihoods of millions of people is ongoing and may never be fully known. There is a critical need for security programs that can assess vulnerabilities and provide mitigations.

There are nine steps that will help you create your final deliverables. The deliverables for this project are as follows:

  1. Security Assessment Report (SAR): This should be an 8-10 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.
  2. Risk Assessment Report (RAR): This report should be a 5-6 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.

Step 1: Enterprise Network Diagram

During Project One, you researched a hypothetical or actual organization of your choice. You had to understand the goals of the organization and the types of systems that would fulfill those goals. You will now research and learn about types of networks and their secure constructs that may be used in organizations to accomplish the functions of the organization’s mission. You will propose a local area network (LAN) and a wide area network (WAN) for the organization, define the systems environment, and incorporate this information in a network diagram. Discuss the security benefits of your chosen network design.

Read about the following computing platforms available for networks and discuss how these platforms could be implemented in your organization. Include the rationale for all platforms you choose to include in your network design.

  • common computing platforms
  • cloud computing
  • distributed computing
  • centralized computing
  • secure programming fundamentals

Step 2: Enterprise Threats

Review the OIG report on the OPM breach that you were asked to research and read about at the beginning of the project. The OIG report included numerous security deficiencies that likely left OPM networks vulnerable to being breached. In addition to those external threats, the report also describes the ways OPM was vulnerable to insider threats. The information about the breach could be classified as threat intelligence. Define threat intelligence and explain what kind of threat intelligence is known about the OPM breach.

You just provided detailed background information on your organization. Next, you’ll describe threats to your organization’s system. Before you get started, select and explore the contents of the following link: insider threats (also known as internal threats). As you’re reading, take note of which insider threats are a risk to your organization.

Now, differentiate between the external threats to the system and the insider threats. Identify where these threats can occur in the previously created diagrams. Relate the OPM threat intelligence to your organization. How likely is it that a similar attack will occur at your organization?

Click here to request for this assignment help

#CYB610 #Project #Common #computing #platforms

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

For this project, select an organization that has leveraged Cloud

  For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage.  Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.  The paper

NO PLAGARISM, 255+ WORDS ANSWER EACH IN DETAIL USE THE

NO PLAGARISM, 255+ WORDS ANSWER EACH IN DETAIL USE THE LINK PROVIDED AND A WORD DOCUMENT FOR ASSIGNMENT https://www.supremecourt.gov/opinions/12pdf/12-398_1b7d.pdf   Identify the requirements for a patent. Then further discuss: Should a company be allowed to patent a life form?   Does it matter if the life form is a non-sentient

How satisfied are employees at work? The response varies according

      How satisfied are employees at work? The response varies according to the individual, the workplace, and the country. Everyone wants to work for a legitimate company, especially one that offers excellent benefits and pays well.  We learn that understanding the motivational variables that drive employee behavior is

Uncompensated Care The plight of uncompensated care is of extreme

  Uncompensated Care The plight of uncompensated care is of extreme concern, especially in regard to the impact on hospitals as frontline caregivers. Select two different types of hospitals. Identify the institutional similarities and differences in dealing with uncompensated care delivery. Discuss ways in which uncompensated care delivery might impact

I can Analyze economic indicators to determine which fiscal and/or

I can Analyze economic indicators to determine which fiscal and/or monetary tools to apply to the economy.  1. The president and congressional leaders are currently looking over economic data to decide the appropriate fiscal policy for the upcoming year. Their goal is a 3% average GPD growth rate and an

“What You Pawn, I Will Redeem”Analysis

“What You Pawn, I Will Redeem” (Sherman Alexie, 2003) [ch.4] Guiding Questions: How does the grandmother’s property at the pawnshop help to determine the narrator’s desires and felling of obligation to recover it? Why is it so important? How does the character accomplish his objective? How is this surprising, considering

Based on the preparation readings, examine how the Bernie Madoff

  Based on the preparation readings, examine how the Bernie Madoff organization was dismantled and give your opinion on whether you believe he was treated fairly during this process. Give your opinion on whether or not you believe the Securities and Exchange Commission failed in not detecting Bernie Madoff’s crime

pick just one theory you think is a “best guide”

  pick just one theory you think is a “best guide” for moral behavior. Then you are to create an Infographic promoting that theory, either on its own or by comparing it to other theories.  Consider yourself as being in marketing and you are trying to convince others to choose

Psychoeducation in Mental Health Although psychoeducational programs for patients with

Psychoeducation in Mental Health Although psychoeducational programs for patients with mental disorders and their families can significantly reduce relapse rates, few patients are offered a psychoeducational program in routine clinical treatment. Providers often find the implementation of routine psychoeducation difficult due to a lack of experience, training, and time. For this

Organizational impact of Affordable Care Act ( social policy)

Organizational impact of Affordable Care Act ( social policy) Assignment 1: Organizational Impact of a social policy (Affordable care Act) ( This assignment is a 5-6 page memorandum (12 point font, single-spaced, double-spaced between paragraphs) which analyzes the impact of Affordable care act Policy in the United States. APA Format

Suppose you were asked to create a time capsule that

Suppose you were asked to create a time capsule that would show people in the future what life was like for civilizations we have covered in this course.  What would you include and why? For this assignment, you will create a 14-slide Powerpoint presentation.  In it, you will include the

In addition to the healthcare risk posed by the current

In addition to the healthcare risk posed by the current COVID-19 pandemic, significant cyber and information security threats are increasing. These global threats impact organizations and individuals. You’ve been asked to complete some research for the healthcare domain that would like more information about the top security threats and attack

https://youtu.be/mGQoEBKEsxY < Describe the reasons Dr. Mitchell Katz and Mark

 https://youtu.be/mGQoEBKEsxY<Describe the reasons Dr. Mitchell Katz and Mark Trotz want to see the government identify housing as a valid “direct healthcare” cost. Why is Bruce Vladek opposed to this idea? Discuss what your thoughts on the idea are. Explain which ideas and personal experiences inform your current viewpoint.<https://youtu.be/ZRpJaap-En0<Identify and describe

Fundamentals of Nursing ( Think Like A Nurse)

1. Think Like a Nurse: 1 Page You have checked the medication record (MAR) for Margaret Marks (Meet Your Patients, in Volume 1) and prepared her next dose of antibiotic for IV administration. The MAR also indicates that she is receiving morphine for pain and that her last dose was