Part 1: Current Security Threats Overall Scenario Aim Higher College

 

Part 1: Current Security Threats 

Overall Scenario
Aim Higher College is a fictitious institution located in the United States. The college offers undergraduate and graduate courses in domains, such as business management, information security, and nursing. Imagine that you have a new job at Aim Higher College as an information security analyst. Throughout this course, you will analyze the threats and vulnerabilities of Aim Higher College and recommend controls to secure the college’s information systems.

Scenario
It is your first day at the job in the information security department, and you are called for a meeting. In the meeting the need for strengthening the information security for the college is discussed, and everyone agrees that the first step in this direction is to identify the top five threats that are a potential risk to Aim Higher College.
The college’s administrative staff and faculty run the latest version of Microsoft Windows on their primary workstations, whereas students’ laptops may run Windows or macOS. The college’s web servers run on Linux; however, all other servers are Windows Server-based. Student, staff, and faculty mobile devices, such as tablets and smartphones, run on iOS or Android; all mobile devices can connect to the campus network.

Tasks
You have been given the responsibility to determine the top five threats that Aim Higher College faces. You asked your supervisor for support in this task and he gave you the following resources that might be useful in your research and analysis:
 Microsoft Security Advisories and Bulletins (https://docs.microsoft.com/en-us/security-updates/)
 Common Vulnerabilities and Exposure (CVE) database search (http://cve.mitre.org/find/index.html)
 Security organizations, such as Secunia (http://secunia.com/)

Your supervisor has also asked you to consider the following questions as you shortlist the threats:
 What threats are new this year, and which have become more prevalent?
 Why are these threats more common and why are they important?
 What threats remain constant from year to year? Why?
 What threats do you believe will become more critical in the next 12 months? Why?
 What is the likelihood of an exploit affecting Aim Higher College, and which operating system(s) does it target?

With these considerations in mind, write a summary report of the top five threats to Aim Higher College. Briefly explain why you have selected them and what effect they might have on the institution or its students, employees, graduates, or other communities on campus.

Part 2: Identify Vulnerabilities in IT Security  

Overall Scenario
Aim Higher College is a fictitious institution located in the United States. The college offers undergraduate and graduate courses in domains, such as business management, information security, and nursing. Imagine that you have a new job at Aim Higher College as an information security analyst. Throughout this course, you will analyze the threats and vulnerabilities of Aim Higher College and recommend controls to secure the college’s information systems.

Scenario
Aim Higher College has been the target of focused attacks from a variety of attackers. Your manager has assigned you the task to review the port and vulnerability scan data recently gathered from a typical system to determine what ports and services are exposed to attackers, and what vulnerabilities exist on that system.

Required Resources
 Access to the Internet
 Text sheet: Zenmap Intense Scan Results pdf file (hacking_ts_zenmapscan.pdf Download hacking_ts_zenmapscan.pdf)

Tasks

1. Analyze the results of the Zenmap scan. Your report must answer the following questions:
 What are the first five open ports as identified by the Zenmap scan?
 Include the port number
 Include the service name
 Include a brief description of how each is used

2. The Nessus scan identified two critical vulnerabilities, identified as ID 32314 and ID 33850.
 Research the vulnerabilities against the Common Vulnerabilities and Exposure (CVE) database .
 Include the name and a brief description of each vulnerability.

3. Determine what can be done to protect the system and defend the campus network against attempts to gather data, and to resolve vulnerabilities. Also determine which ports and services likely need to remain open.

4. Write a report targeted at IT management and systems administration staff explaining the vulnerabilities and protection mechanisms that Aim Higher College should adopt, which will be applied to all similar systems at the college.

  

Submission Requirements for both parts of the project:

  • Format: Microsoft Word
  • Font: Arial, 12-Point, Double-Space
  • Citation Style: APA
  • Length: Each part should have a minimum of 3 pages. So overall report size should be a minimum of 6 pages (excluding title page and bibliography).

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Use a sources such as the Internet, newspaper, magazine, journal,

 Use a sources such as the Internet, newspaper, magazine, journal, find a recent article (less than six months old) on cyber-attack or on an information security breach. This will be a summary of 1,000 word of the article which is double space.  Describe the issue and cause, and give recommendations

Two software are dropbox and slack Part 2 User test

  Two software are dropbox and slack Part 2 User test the final two options. User test your two options to determine the best software for your team’s management needs. Use the scenarios provided to assess the options. Planning the project and creating a schedule Schedule a meeting at Starbucks for

Assignment 1: Psychotherapeutic Approaches to Group Therapy for

Assignment 1: Psychotherapeutic Approaches to Group Therapy for Addiction When selecting a psychotherapeutic approach for a client, you must consider the unique needs and characteristics of that particular client. The same is true when selecting a psychotherapeutic approach for groups. Not every approach is appropriate for every group, and the

How do you anticipate integrating this role into your current

  How do you anticipate integrating this role into your current or future career? As healthcare presents with an increased complexity it provokes an increased need for the DNP scholar in healthcare (Beeber et al., 2019). As a future DNP scholar, I plan to integrate the knowledge and skills obtained

Introduction In this week’s assignment, you focus on using healthy

Introduction In this week’s assignment, you focus on using healthy competition and rewards to drive employees to perform their best. This will be the third part of your Motivational Game Plan. Scenario In your new position as General Manager for Hometown Cars, you are responsible for increasing your company’s profits

Assignment: Life Span Interview Ray’s case has provided you with

   Assignment: Life Span Interview Ray’s case has provided you with direct observation of a client’s history and life experiences. In the absence of this direct observation, social workers turn to assessment and interview techniques to gather essential facts about a client’s life span. Interviewing is an important social work

In this unit, you were introduced to various leadership strategies

In this unit, you were introduced to various leadership strategies for communicating organizational vision, goal setting, and decision-making. Effective leaders are known for seeking ways to better connect with followers in order to enhance team performances, promote organizational effectiveness, and seek clarity on what has been working well while determining

SEU Cardiovascular System Questions Nursing Assignment Help

I need help with a Health & Medical question. All explanations and answers will be used to help me learn. Q) Choose any system of the human body and prepare a response to   the following questions in 1-2 pages: Introduction(Explain   the system with the components) Body(Explain   how the system relates

Discussion 1: Think about the capital investment methods and criteria

 Discussion 1:  Think about the capital investment methods and criteria that have been discussed in this unit. Do you believe these are applicable for not-for-profit corporations or for government? That governments and not-for-profit organizations should evaluate investments using these techniques? Explain citing examples or research. (200-300 words,I need Example and

Culture and/or Climate in the Workplace—Do They Matter? Using this

 Culture and/or Climate in the Workplace—Do They Matter?  Using this week’s content and resources as a start, locate three research studies that support the premise that better managers are those who pursue an understanding of the culture and/or climate of their organization. Why does it matter to gain insight about

To Submit your case: Follow instructions given in each steps

To Submit your case: Follow instructions given in each steps use this template for write up follow the rubric provided Specifications: Each individual case should be 3-4 pages, double spaced, with 12pt Time New Roman or Arial font and 1 inch margin.  WILL BE GOING THROUGH A PLAGIARISM CHECKER SO

WU Motivational Junk Food Versus Health Food Discussion Nursing Assignment Help

MOTIVATIONAL JUNK FOOD VERSUS HEALTH FOOD  Culture and optimal motivation will ideally support and reinforce one another. Managers who resist short-term, motivational fixes and focus on more long-term approaches will create an environment, over time, that helps employees manage their own motivation effectively in ways that benefit the individual and

Describe how the confusion matrix is used for model evaluation.

Describe how the confusion matrix is used for model evaluation. Describe the definition of accuracy, precision, recall, sensitivity, specificity, True positive rate, False positive rate. Synthesize real-life examples where you would rely on each one of these measures to evaluate prediction, or classification, performance of your model. What is a

What are the main differences between the American presidential model

Answer the following questions as fully and completely as possible. A short paragraph should probably be enough… 1) In Part I of “Comparative Politics in Transition”, John McCormick describes and analyzes Liberal Democracies. His description includes a comparative analysis of different types of democracies-elite v. group or pluralist. My question

Compose a focused paper that explains and describes your healthcare

Premium Paper Help is a professional writing service that provides original papers. Our products include academic papers of varying complexity and other personalized services, along with research materials for assistance purposes only. All the materials from our website should be used with proper references.