The assignment talks about the Risk, Threat and Vulnerability Management-Security Analysis Baseline.You will get your information from a data-flow diagram and report from the Microsoft Threat Modeling Tool 2016. Then scope should include network IT security for the whole organization.

Risk, Threat and Vulnerability Management-Security Analysis Baseline

Risk, Threat, and Vulnerability Management. Deliverables 10 Page security assessment report (SAR) Transcript Many companies and agencies conduct IT audits to test and assess the rigor of IT security controls in order to mitigate risks to IT networks. So, Such audits meet compliance mandates by regulatory organizations. Federal IT systems follow Federal Information System Management Act (FISMA) guidelines and report security compliance to US-CERT, the United States Computer Emergency Readiness Team, which handles defense and response to cyberattacks as part of the Department of Homeland Security.

In addition, the Control Objective for Information Technology (COBIT) is a set of IT security guidelines that provides a framework for IT security for IT systems in the commercial sector. Also,  these audits are comprehensive and rigorous, and negative findings can lead to significant fines and other penalties. Therefore, industry and federal entities conduct internal self-audits in preparation for actual external IT audits, and compile security assessment reports.

Risk, Threat and Vulnerability Management-Security Analysis Baseline

Step 1: Conduct a Security Analysis Baseline In the first step of the project, you will conduct a security analysis baseline of the IT systems, which will include a data-flow diagram of connections and endpoints, and all types of access points, including wireless. The baseline report will be part of the overall security assessment report (SAR). You will get your information from a data-flow diagram and report from the Microsoft Threat Modeling Tool 2016. The scope should include network IT security for the whole organization.  Click the following to view the data-flow diagram: [diagram and report] Include the following areas in this portion of the SAR: 1. Security requirements and goals for the preliminary security baseline activity. 2. Typical attacks to enterprise networks and their descriptions. Include Trojans, viruses, worms, denial of service, session hijacking, and social engineering. 

Detailed Instructions

 |

Do you need Assignment help from intel-writers.us?

intel-writers.us is one of the best essay help websites on the internet

Kindly click the link below to order quality essays from qualified assignment help experts
We offer well written, referenced and plagiarism free papers .

Click here to request for this assignment help