CST 610 Project 2 Assessing Information System Vulnerabilities And Risk

Question # 00837922 Posted By: wildcraft Updated on: 01/28/2023 03:55 AM Due on: 01/28/2023
Subject Education Topic General Education Tutorials:
Dot Image

CST 610 Project 2 Assessing Information System Vulnerabilities And Risk

You are an information assurance management officer (IAMO) at an organization of your choosing. One morning, as you're getting ready for work, you see an email from Karen, your manager. She asks you to come to her office as soon as you get in. When you arrive to your work, you head straight to Karen's office. “Sorry for the impromptu meeting,” she says, “but we have a bit of an emergency. There's been a security breach at the Office of Personnel Management.”

We don't know how this happened, but we need to make sure it doesn't happen again, says Karen. You'll be receiving an email with more information on the security breach. Use this info to assess the information system vulnerabilities of the Office of Personnel Management.

At your desk, you open Karen's email. She's given you an OPM report from the Office of the Inspector General, or OIG. You have studied the OPM OIG report and found that the hackers were able to gain access through compromised credentials. The security breach could have been prevented if the Office of Personnel Management, or OPM, had abided by previous auditing reports and security findings. In addition, access to the databases could have been prevented by implementing various encryption schemas and could have been identified after running regularly scheduled scans of the systems.

Karen and the rest of the leadership team want you to compile your findings into a Security Assessment Report, or SAR. You will also create a Risk Assessment Report, or RAR, in which you identify threats, vulnerabilities, risks, and likelihood of exploitation and suggested remediation.

Dot Image
Tutorials for this Question
  1. Tutorial # 00833379 Posted By: wildcraft Posted on: 01/28/2023 03:56 AM
    Puchased By: 2
    Tutorial Preview
    The solution of CST 610 Project 2 Assessing Information System Vulnerabilities And Risk...
    CST_610_Project_2_Assessing_Information_System_Vulnerabilities_And_Risk.ZIP (18.96 KB)

Great! We have found the solution of this question!

Whatsapp Lisa