Need help with my Computer Science question - I’m studying for my class.
Part A:
Select an organization you wish to explore and use throughout the course.
As you make your selection, keep in mind that you will explore the following roles in the organization: Cyber Security Threat Analyst, Penetration Tester, Cyber Security Engineer, Risk Management Analyst, and Software Engineer. You need sufficient knowledge of the organization you select to complete these security assignments.
Part B:
A Cyber Security Threat Analyst conducts analysis, digital forensics, and targeting to identify, monitor, assess, and counter cyber-attack threats against information systems, critical infrastructure, and cyber-related interests.
Take on the role of a Cyber Security Threat Analyst for the organization you select. Use the Threats, Attacks, and Vulnerability Assessment Template to create a 3- to 4-page assessment document.
Research and include the following:
REFER TO ADDITIONAL RESOURCES BELOW and to the grading rubric.
Provide a scope description of the system you are assessing.Provide a network diagram of the system on which you are conducting a risk assessment.(Microsoft®Visio®or Lucidchart®)
Describe at least 12 possible threat agents and how attacks are accomplished with each (attention to attack paths)
Describe at least seven exploitable technical and physical vulnerabilities that would enable a successful attack.
List at least two security incidents that happened to this organization, or within its industry, against similar systems (same data or business process)
Describe the risks associated with at least five threat/vulnerability sets defined in this document.