Applied Science  >  STUDY GUIDE  >  CST 610 Project 2 Assessing Information System Vulnerabilities and Risk (All)

CST 610 Project 2 Assessing Information System Vulnerabilities and Risk

Document Content and Description Below

You are an information assurance management officer (IAMO) at an organization of your choosing. One morning, as you're getting ready for work, you see an email from Karen, your manager. She asks you t ... o come to her office as soon as you get in. When you arrive to your work, you head straight to Karen's office. “Sorry for the impromptu meeting,” she says, “but we have a bit of an emergency. There's been a security breach at the Office of Personnel Management.” We don't know how this happened, but we need to make sure it doesn't happen again, says Karen. You'll be receiving an email with more information on the security breach. Use this info to assess the information system vulnerabilities of the Office of Personnel Management. At your desk, you open Karen's email. She's given you an OPM report from the Office of the Inspector General, or OIG. You have studied the OPM OIG report and found that the hackers were able to gain access through compromised credentials. The security breach could have been prevented if the Office of Personnel Management, or OPM, had abided by previous auditing reports and security findings. In addition, access to the databases could have been prevented by implementing various encryption schemas and could have been identified after running regularly scheduled scans of the systems. Karen and the rest of the leadership team want you to compile your findings into a Security Assessment Report, or SAR. You will also create a Risk Assessment Report, or RAR, in which you identify threats, vulnerabilities, risks, and likelihood of exploitation and suggested remediation. [Show More]

Last updated: 2 years ago

Preview 1 out of 8 pages

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)
Preview image of CST 610 Project 2 Assessing Information System Vulnerabilities and Risk document

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Reviews( 0 )

$5.50

Buy Now

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Instant download

Can't find what you want? Try our AI powered Search

88
0

Document information


Connected school, study & course


About the document


Uploaded On

Jan 28, 2023

Number of pages

8

Written in

All

Seller


Profile illustration for ACADEMICTUTORIAL
ACADEMICTUTORIAL

Member since 5 years

24 Documents Sold

Reviews Received
3
0
0
0
2
Additional information

This document has been written for:

Uploaded

Jan 28, 2023

Downloads

 0

Views

 88

Document Keyword Tags

More From ACADEMICTUTORIAL

View all ACADEMICTUTORIAL's documents »

Recommended For You

Get more on STUDY GUIDE »

$5.50
What is Scholarfriends

Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·