CYB610 Project 3: Common computing platforms

 

You are an Information Assurance Management Officer, IAMO, at an organization of your choosing. One morning, as you’re getting ready for work, you see an email from Karen, your manager. She asks you to come to her office as soon as you get in. When you arrive to your work, you head straight to Karen’s office. “Sorry for the impromptu meeting,” she says, “but we have a bit of an emergency. There’s been a security breach at the Office of Personnel Management.” We don’t know how this happened, but we need to make sure it doesn’t happen again, says Karen. You’ll be receiving an email with more information on the security breach. Use this info to assess the information system vulnerabilities of the Office of Personnel Management. At your desk, you open Karen’s email. She’s given you an OPM report from the Office of the

Inspector General, or OIG. You have studied the OPM OIG report and found that the hackers were able to gain access through compromised credentials. The security breach could have been prevented, if the Office of Personnel Management, or OPM, had abided by previous auditing reports and security findings. In addition, access to the databases could have been prevented by implementing various encryption schemas and could have been identified after running regularly scheduled scans of the systems. Karen and the rest of the leadership team want you to compile your findings into a Security Assessment Report or SAR. You will also create a Risk Assessment Report, or RAR, in which you identify threats, vulnerabilities, risks, and likelihood of exploitation and suggested remediation

 

The security posture of the information systems infrastructure of an organization should be regularly monitored and assessed (including software, hardware, firmware components, governance policies, and implementation of security controls). The monitoring and assessment of the infrastructure and its components, policies, and processes should also account for changes and new procurements that are sure to follow in order to stay in step with ever-changing information system technologies.

The data breach at the Office of Personnel Management (OPM) is one of the largest in US government history. It provides a series of lessons learned for other organizations in industry and the public sector. Some critical security practices, such as lack of diligence to security controls and management of changes to the information systems infrastructure were cited as contributors to the massive data breach in the OPM Office of the Inspector General’s (OIG) Final Audit Report, which can be found in open source searches. Some of the findings in the report include: weak authentication mechanisms; lack of a plan for life-cycle management of the information systems; lack of a configuration management and change management plan; lack of inventory of systems, servers, databases, and network devices; lack of mature vulnerability scanning tools; lack of valid authorizations for many systems, and lack of plans of action to remedy the findings of previous audits.

The breach ultimately resulted in removal of OPM’s top leadership. The impact of the breach on the livelihoods of millions of people is ongoing and may never be fully known. There is a critical need for security programs that can assess vulnerabilities and provide mitigations.

There are nine steps that will help you create your final deliverables. The deliverables for this project are as follows:

  1. Security Assessment Report (SAR): This should be an 8-10 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.
  2. Risk Assessment Report (RAR): This report should be a 5-6 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.

Step 1: Enterprise Network Diagram

During Project One, you researched a hypothetical or actual organization of your choice. You had to understand the goals of the organization and the types of systems that would fulfill those goals. You will now research and learn about types of networks and their secure constructs that may be used in organizations to accomplish the functions of the organization’s mission. You will propose a local area network (LAN) and a wide area network (WAN) for the organization, define the systems environment, and incorporate this information in a network diagram. Discuss the security benefits of your chosen network design.

Read about the following computing platforms available for networks and discuss how these platforms could be implemented in your organization. Include the rationale for all platforms you choose to include in your network design.

  • common computing platforms
  • cloud computing
  • distributed computing
  • centralized computing
  • secure programming fundamentals

Step 2: Enterprise Threats

Review the OIG report on the OPM breach that you were asked to research and read about at the beginning of the project. The OIG report included numerous security deficiencies that likely left OPM networks vulnerable to being breached. In addition to those external threats, the report also describes the ways OPM was vulnerable to insider threats. The information about the breach could be classified as threat intelligence. Define threat intelligence and explain what kind of threat intelligence is known about the OPM breach.

You just provided detailed background information on your organization. Next, you’ll describe threats to your organization’s system. Before you get started, select and explore the contents of the following link: insider threats (also known as internal threats). As you’re reading, take note of which insider threats are a risk to your organization.

Now, differentiate between the external threats to the system and the insider threats. Identify where these threats can occur in the previously created diagrams. Relate the OPM threat intelligence to your organization. How likely is it that a similar attack will occur at your organization?

Click here to request for this assignment help

#CYB610 #Project #Common #computing #platforms

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

You work for a large financial institution. Discuss the importance

 You work for a large financial institution. Discuss the importance of information governance and information security, from the perspective of your customers, and your employees. Should your large financial institution make its information governance and information security clear to its customers and why? Moreover, The CEO feels that the capital

Claude Grunitzky: How did Claude build his networks?

As you write up the Claude Grunitzky case, focus on issues of power and networks. The most weight is awarded to Q2-4. Please consider the following questions: 1. How successful has Claude been? Why and how? 2. How would you describe Claude? Who is he as a person? What are

In business, composing a message requires following a few key

In business, composing a message requires following a few key steps. The writer must adapt to his or her audience, choose powerful words, selecting the right medium and proofreading. In this assignment, you are going to practice using a blog as a medium for delivering your message. Instructions: • Use

Must be nine to 11 double-spaced pages in length (not

 Must be nine to 11 double-spaced pages in length (not including title and references pages or slides) and formatted according to APA Style  Read Chapter 9 of the course text, Principles of Marketing Chapter 10      of the course text, Principles of Marketing It is recommended you review the course text

Science Internship Programming Project Nursing Assignment Help

Expert Solution Preview Introduction: As a medical professor, my primary responsibility is to create college assignments and evaluate the performance of medical college students. I design and conduct lectures, administer examinations, and provide feedback to enhance their learning experience. In this role, I aim to foster a comprehensive understanding of

Overview: For this assignment you will choose to view either

Overview: For this assignment you will choose to view either Edgar Wright’s Shaun of the Dead or Rian Johnson’s Brick to analyze and discuss its genre. Instructions: Be sure that you have reviewed the resources on genre before beginning. This assignment may require multiple viewings of your chosen film, as

NSG 600 MDC Health & Medical Legislative Communication Letter Nursing Assignment Help

Instructions Legislative Communication: Letter Draft a Legislative Letter to a specific legislator and offer support or a constructive argument against pending or passed policy or legislation that you are passionate about.    Expert Solution Preview Introduction: As a medical professor responsible for creating assignments for college students, I recognize the

Imagine you are in a fast-food restaurant where a lady

Imagine you are in a fast-food restaurant where a lady tells you that she had heard there was a gene for liking or hating the taste of cilantro. You looked on the Internet to investigate this statement, and although you found similar comments on reputable websites, you are yet to

Prepare 3 pages double-spaced paper covering the below questions. Explain

Prepare 3 pages double-spaced paper covering the below questions.  Explain how the above question will be investigated and why the above question is important. What is Crypto Currency? Approach: How crypto has been treated in the past, the new announcement, and Examples of companies with lots of cryptos. Importance: A

Using what you know about your personal leadership style and

 Using what you know about your personal leadership style and the tenets of servant leadership, explain why it is important to be able to meld these principles together as a public health professional and leader. Provide two suggestions for doing so. In replies to peers, discuss whether you agree or

Share your thoughts and opinions on representation of racial and

  Share your thoughts and opinions on representation of racial and ethnic minorities. Representation of racial and ethnic minorities in the media affects our perceptions of individuals. In what way can media change people’s minds about those who are different than them? Give real life examples from your own experience

Assignment Instructions Write a paper in which you discuss the

  Assignment Instructions Write a paper in which you discuss the various methods that you can use to convert numbers between number bases. Be sure to include a discussion of at least three different conversion methods and provide a conversion example for each method that you explain. You should discuss

Essay Instructions Context This essay is based on a movie Nursing Assignment Help

Essay Instructions Context This essay is based on a movie that appeared in 1993 entitled: And the Band Played On.  “The movie chronicles the discovery and spread of the human immunodeficiency virus (HIV) and acquired immune deficiency syndrome (AIDS) with a special emphasis on government indifference and political infighting—specifically in the United States—to what

Introducing Pearson Edexcel NVQ/Competence-based qualifications

National Vocational Qualifications (NVQs) or Competence-based qualifications reflect the skills and knowledge needed to do a job effectively. They are work-based qualifications that give learners the opportunity to demonstrate their competence in the area of work or job role to which the qualification relates. NVQs/Competence-based qualifications are outcomes-based with no

Using the Library Information Resource Network (LIRN), JSTOR, or any

  Using the Library Information Resource Network (LIRN), JSTOR, or any other electronic journal database, research eight (8) peer-reviewed articles that can be used to answer below assignment. Your discussion should summarize the articles in such a way that it can justify any arguments you may present in your below

Oncology Care

Background part of research: Statement of the problem (Introduction) specific clinical or policy issue to be addressed is described. Documentation of the existence and scope of the problem and the effects on individuals and the health system is presented. Provide any definition of terms. Describe a conceptual framework that will