Chat with us, powered by LiveChat In your role as a highly paid consultant, you are given a list of potential threats Word Document to and vulnerabilities of the current communication security protoco - Wridemy

In your role as a highly paid consultant, you are given a list of potential threats Word Document to and vulnerabilities of the current communication security protoco

In your role as a highly paid consultant, you are given a list of potential threats Word Document to and vulnerabilities of the current communication security protocols of an organization. You are asked to provide quantitative data to measure the likelihood that any of these threats will actually occur for the information assets of the client. Conduct research and describe resources you found that might provide insight into measuring the likelihood that some of the threats would actually occur. In the explanation, include whether you see a trend in resources that might indicate a specific industry is particularly involved in gathering this kind of data. Additionally, evaluate which communication security protocols are more effective and provide an explanation.

Submit your assignment here. Make sure you’ve included all the required elements by reviewing the guidelines and rubric.

For the Module Six assignment, students will be placed into the role of an IT consultant whose task is to evaluate an existing organization’s security protocols. Once the protocols have been analyzed, students will synthesize this knowledge to provide insight into the likelihood of certain threats occurring. The skills acquired from this exercise will prove to be beneficial during the final stages of designing the information assurance plan.

Prompt

In your role as a highly paid consultant, you are given a list of potential threats to and vulnerabilities of the current communication security protocols of an organization. You are asked to provide quantitative data to measure the likelihood that any of these threats will actually occur for the information assets of the client. Conduct research and describe resources you found that might provide insight into measuring the likelihood that some of the threats would actually occur. In the explanation, include whether you see a trend in resources that might indicate a specific industry is particularly involved in gathering this kind of data. Additionally, evaluate which communication security protocols are more effective and provide an explanation.

What to Submit

Your responses for the prompt must be submitted as two to three paragraphs and as a Microsoft Word document with double spacing, 12-point Times New Roman font, one-inch margins, and at least three sources cited in APA format.

MP_SNHU_withQuill_Horizstack

IT 549 List of Possible Threats/Vulnerabilities

· Spoofing is attempting to gain access to a system by using a false identity. This can be accomplished using stolen user credentials or a false IP address. After the attacker successfully gains access as a legitimate user or host, elevation of privileges or abuse using authorization can begin.

· Tampering is the unauthorized modification of data, for example, as it flows over a network between two computers.

· Repudiation is the ability of users (legitimate or otherwise) to deny that they performed specific actions or transactions. Without adequate auditing, repudiation attacks are difficult to prove.

· Information disclosure is the unwanted exposure of private data. For example, a user views the contents of a table or file he or she is not authorized to open, or monitors data passed in plain text over a network. Some examples of information disclosure vulnerabilities include the use of hidden form fields, comments embedded in webpages that contain database connection strings and connection details, and weak exception handling that can lead to internal system-level details being revealed to the client. Any of this information can be very useful to the attacker.

· Denial of service is the process of making a system or application unavailable. For example, a denial of service attack might be accomplished by bombarding a server with requests to consume all available system resources or by passing it malformed input data that can crash an application process.

· Elevation of privilege occurs when a user with limited privileges assumes the identity of a privileged user to gain privileged access to an application. For example, an attacker with limited privileges might elevate his or her privilege level to compromise and take control of a highly privileged and trusted process or account.

This information comes from the Microsoft website https://msdn.microsoft.com/en-us/library/ee823878(v=cs.20).aspx

image1.jpeg

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

About Wridemy

We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.

How It Works

To make an Order you only need to click on “Place Order” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Are there Discounts?

All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.

Hire a tutor today CLICK HERE to make your first order