Project : Risk, Threat, and Vulnerability Management

1. Security Assessment Report (12 pages)
Conduct a Security Analysis Baseline (3 of 12 ages)
Security requirements and goals for the preliminary security baseline activity.
Typical attacks to enterprise networks and their descriptions. Include Trojans, viruses, worms, denial of service, session hijacking, and social engineering.
Include the impacts these attacks have on an organization.
Network infrastructure and diagram, including configuration and connections
Describe the security posture with respect to LAN, MAN, WAN, enterprise.
Network infrastructure and diagram, including configuration and connections and endpoints.
What are the security risks and concerns?
What are ways to get real-time understanding of the security posture at any time?
How regularly should the security of the enterprise network be tested, and what type of tests should be used?
What are the processes in play, or to be established to respond to an incident?
Does the security workforce have the requisite technical skills and command of the necessary toolsets to do the job required?
Is there an adequate professional development roadmap in place to maintain and/or improve the skill set as needed?
Describe the ways to detect these malicious code and what tactics bad actors use for evading detection.
In the network diagram: include  the delineation of open and closed networks, where they co-exist.
In the open network and closed network portion, show the connections to the Internet
Physical hardware components. Include routers and switches. What security weaknesses or vulnerabilities are within these devices?
Discuss operating systems, servers, network management systems.data in transit vulnerabilities
endpoint access vulnerabilities
external storage vulnerabilities
virtual private network vulnerabilities
media access control vulnerabilities
ethernet vulnerabilities
Possible applications. Current and future mobile applications and possible future Bring Your Own Device policy.
Include:

remediation
mitigation
countermeasure
recovery
Provide the methods used to provide the protections and defenses.
From the identification of risk factors in the risk model, identify the appropriate security controls from NIST SP 800-53A and determine their applicability to the risks identified.
Determine a Network Defense Strategy 2/12 pages
Outline how you would test violations.
Identify how you will assess the effectiveness of these controls and write test procedures that could be used to test for effectiveness.
Write them in a manner to allow a future information systems security officer to use them in preparing for an IT security audit or IT certification and accreditation.
Explain the different testing types (black box testing, white box testing).
Plan the Penetration Testing Engagement 2/12 pages
Include all involved processes, people, and timeframe.
Develop a letter of intent to the organization, and within the letter, include some formal rules of engagement (ROE)
Conduct a Network Penetration Test 4/12 pages
After finding the security issues within the network, define which control families from the NIST 800-53 are violated by these issues.
Explain in the SAR why each is a violation, support your arguments with a copy of your evidence
Provide suggestions on improving the security posture of these violations.
Complete a Risk Management Cost Benefit Analysis 1/12 pages
Complete your SAR with a risk management cost benefit analysis. Think about the cost of violations and other areas if you do not add the controls. Then add in the cost for implementing your controls.

Theoretical Perspective

Students will choose a theoretical perspective and, a) provide an intelligent discussion of the theory (citing the original theorist in text and listing the original work on your references page, of course), b) discuss at least four (4) empirical articles testing the theorys validity, c) and conclude with policy implications of the theory.

Research papers are to be exactly five pages of content in length and must be completed in APA format (12 pt. Times New Roman font, double spaced throughout the entire paper, with 1 margins). Research papers do not need an abstract but must include a title page, running head, page numbers, in-text headings that divide the paper’s sections, and a references page.

medieval and/or early modern philosophy

The paper must focus on some topic found in medival and/or early modern philosophy. You must use at least one primary source and at least one secondary source for this paper. Full references, given either in the body of the paper and/or in a separate bibliography or works cited section, are required. It is not inappropriate to compare/contrast figures from the two time periods (medival and early modern) even perhaps in a dialogue format; nor is it inappropriate to work in some other creative manner. Also, feel free to use the secondary source (I’ve attached below) as a model for this paper. You may also use it as one of your sources for the paper if you so wish to write about that topic. Finally, I also attached my paper on that secondary source that can be recycled into this paper if you decided to do the same topic, but I encourage you to pick whatever topic you’d most enjoy writing about. Thank you.

campus/community garden

On your own this week, visit a community garden or farm of your choice. (Virtual)

*GIVEN CURRENT CIRCUMSTANCES YOU MAY ALSO DO A VIRTUAL GARDEN/PARKS TOUR! You may also choose to walk to a local park or around your neighborhood. Sources for virtual options are below (feel free to find your own virtual option too)!

choose one of the following to do a virtual tour

 
https://www.usbg.gov/take-virtual-tour

 
https://www.buffalogardens.com/pages/our-gardens

Virtual Tour of Summer at the Chicago Botanic Garden

Cleveland Botanical Garden Virtual Tour
 

 
 
 
Step 1: Walk through the space and observe.  What do you see?  What is the garden/farm like?  What do you notice?  What services are offered?  What do you notice about people using the space, or who it is intended for?  Engage your 5 senses to explore the garden.  
Step 2: Take a selfie at the garden to upload with your assignment. (You can take a selfie with your computer screen if doing this virtually!)
Step 3: Write an OIA Reflection.  O=observe, I=interpret, A=apply
Observe:  List some of the key observations you made.
Interpret:  What do your observations mean?  Why is the facility like it is?  Why do they offer the services you noted above?  Discuss the “why” behind your observations, your analysis of the facility.
Apply:  How does this space add to the environmental wellness of the community?  What overlaps do you see with other dimensions of wellness (i.e. physical, mental, spiritual, occupational, intellectual, social, or financial)?
Step 4:  Upload your OIA reflection (about 3 paragraphs) and selfie to this assignment.

Criteria

Visited a community garden

Selfie submission (virtual picture)

Observe: List some of the key observations you made.
This should be an in depth paragraph describing your observational experience.

Interpret: What do your observations mean? Why is the facility like it is? Why do they offer the services you noted above? Discuss the “why” behind your observations, your analysis of the facility.
This should be an in depth paragraph answering ALL components of the question.

Apply: How does this space add to the environmental wellness of the community? What overlaps do you see with other dimensions of wellness (i.e. physical, mental, spiritual, occupational, intellectual, social, or financial)?
This should be an in depth paragraph answering ALL questions.