SlideShare a Scribd company logo
1 of 2
CYB610 Project 3: Common computing platforms
You are an Information Assurance Management Officer, IAMO, at an organization of your
choosing. One morning, as you’re getting ready for work, you see an email from Karen, your
manager. She asks you to come to her office as soon as you get in. When you arrive to your
work, you head straight to Karen’s office. “Sorry for the impromptu meeting,” she says, “but
we have a bit of an emergency. There’s been a security breach at the Office of Personnel
Management.” We don’t know how this happened, but we need to make sure it doesn’t
happen again, says Karen. You’ll be receiving an email with more information on the
security breach. Use this info to assess the information system vulnerabilities of the Office of
Personnel Management. At your desk, you open Karen’s email. She’s given you an OPM
report from the Office of theInspector General, or OIG. You have studied the OPM OIG report
and found that the hackers were able to gain access through compromised credentials. The
security breach could have been prevented, if the Office of Personnel Management, or OPM,
had abided by previous auditing reports and security findings. In addition, access to the
databases could have been prevented by implementing various encryption schemas and
could have been identified after running regularly scheduled scans of the systems. Karen
and the rest of the leadership team want you to compile your findings into a Security
Assessment Report or SAR. You will also create a Risk Assessment Report, or RAR, in which
you identify threats, vulnerabilities, risks, and likelihood of exploitation and suggested
remediation The security posture of the information systems infrastructure of an
organization should be regularly monitored and assessed (including software, hardware,
firmware components, governance policies, and implementation of security controls). The
monitoring and assessment of the infrastructure and its components, policies, and
processes should also account for changes and new procurements that are sure to follow in
order to stay in step with ever-changing information system technologies. The data breach
at the Office of Personnel Management (OPM) is one of the largest in US government
history. It provides a series of lessons learned for other organizations in industry and the
public sector. Some critical security practices, such as lack of diligence to security controls
and management of changes to the information systems infrastructure were cited as
contributors to the massive data breach in the OPM Office of the Inspector General’s (OIG)
Final Audit Report, which can be found in open source searches. Some of the findings in the
report include: weak authentication mechanisms; lack of a plan for life-cycle management of
the information systems; lack of a configuration management and change management
plan; lack of inventory of systems, servers, databases, and network devices; lack of mature
vulnerability scanning tools; lack of valid authorizations for many systems, and lack of plans
of action to remedy the findings of previous audits. The breach ultimately resulted in
removal of OPM’s top leadership. The impact of the breach on the livelihoods of millions of
people is ongoing and may never be fully known. There is a critical need for security
programs that can assess vulnerabilities and provide mitigations.There are nine steps that
will help you create your final deliverables. The deliverables for this project are as
follows:Security Assessment Report (SAR): This should be an 8-10 page double-spaced
Word document with citations in APA format. The page count does not include figures,
diagrams, tables, or citations.Risk Assessment Report (RAR): This report should be a 5-6
page double-spaced Word document with citations in APA format. The page count does not
include figures, diagrams, tables, or citations.Step 1: Enterprise Network DiagramDuring
Project One, you researched a hypothetical or actual organization of your choice. You had to
understand the goals of the organization and the types of systems that would fulfill those
goals. You will now research and learn about types of networks and their secure constructs
that may be used in organizations to accomplish the functions of the organization’s mission.
You will propose a local area network (LAN) and a wide area network (WAN) for the
organization, define the systems environment, and incorporate this information in a
network diagram. Discuss the security benefits of your chosen network design. Read about
the following computing platforms available for networks and discuss how these platforms
could be implemented in your organization. Include the rationale for all platforms you
choose to include in your network design.common computing platforms cloud computing
distributed computing centralized computing secure programming fundamentals Step 2:
Enterprise ThreatsReview the OIG report on the OPM breach that you were asked to
research and read about at the beginning of the project. The OIG report included numerous
security deficiencies that likely left OPM networks vulnerable to being breached. In addition
to those external threats, the report also describes the ways OPM was vulnerable to insider
threats. The information about the breach could be classified as threat intelligence. Define
threat intelligence and explain what kind of threat intelligence is known about the OPM
breach.You just provided detailed background information on your organization. Next,
you’ll describe threats to your organization’s system. Before you get started, select and
explore the contents of the following link: insider threats (also known as internal threats).
As you’re reading, take note of which insider threats are a risk to your organization.Now,
differentiate between the external threats to the system and the insider threats. Identify
where these threats can occur in the previously created diagrams. Relate the OPM threat
intelligence to your organization. How likely is it that a similar attack will occur at your
organization?Click here to request for this assignment help#CYB610 #Project #Common
#computing #platforms

More Related Content

Similar to CYB610 Project Common computing platforms.docx

Cain and AbelOphcrackStart H.docx
Cain and AbelOphcrackStart H.docxCain and AbelOphcrackStart H.docx
Cain and AbelOphcrackStart H.docxRAHUL126667
 
Cyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comCyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comPrescottLunt386
 
The Technical Report and Executive SummaryTechnical report Your.docx
The Technical Report and Executive SummaryTechnical report Your.docxThe Technical Report and Executive SummaryTechnical report Your.docx
The Technical Report and Executive SummaryTechnical report Your.docxgloriab9
 
Running head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docx
Running head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docxRunning head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docx
Running head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docxjeanettehully
 
Cyb 610 Believe Possibilities / snaptutorial.com
Cyb 610  Believe Possibilities / snaptutorial.comCyb 610  Believe Possibilities / snaptutorial.com
Cyb 610 Believe Possibilities / snaptutorial.comDavis12a
 
Cyb 610 Enhance teaching / snaptutorial.com
Cyb 610   Enhance teaching / snaptutorial.comCyb 610   Enhance teaching / snaptutorial.com
Cyb 610 Enhance teaching / snaptutorial.comBaileyaby
 
Cyb 610 Education Organization-snaptutorial.com
Cyb 610 Education Organization-snaptutorial.comCyb 610 Education Organization-snaptutorial.com
Cyb 610 Education Organization-snaptutorial.comrobertlesew8
 
CST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.comCST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.comjonhson198
 
CYB 610 Effective Communication - snaptutorial.com
CYB 610 Effective Communication - snaptutorial.comCYB 610 Effective Communication - snaptutorial.com
CYB 610 Effective Communication - snaptutorial.comdonaldzs9
 
CYB 610 Exceptional Education - snaptutorial.com
CYB 610   Exceptional Education - snaptutorial.comCYB 610   Exceptional Education - snaptutorial.com
CYB 610 Exceptional Education - snaptutorial.comDavisMurphyA98
 
Cst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.comCst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.comamaranthbeg113
 
Cst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.comCst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.comamaranthbeg53
 
Cst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.comCst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.comamaranthbeg73
 
Cst 610 Believe Possibilities / snaptutorial.com
Cst 610  Believe Possibilities / snaptutorial.comCst 610  Believe Possibilities / snaptutorial.com
Cst 610 Believe Possibilities / snaptutorial.comDavis10a
 
CST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.comCST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.comchrysanthemu49
 
Cst 610 Enhance teaching / snaptutorial.com
Cst 610  Enhance teaching / snaptutorial.comCst 610  Enhance teaching / snaptutorial.com
Cst 610 Enhance teaching / snaptutorial.comBaileyabw
 
Cyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.comCyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.comMcdonaldRyan80
 
CST 610 Effective Communication - snaptutorial.com
CST 610 Effective Communication - snaptutorial.comCST 610 Effective Communication - snaptutorial.com
CST 610 Effective Communication - snaptutorial.comdonaldzs7
 
CSEC 610 Education Specialist / snaptutorial.com
CSEC 610 Education Specialist / snaptutorial.comCSEC 610 Education Specialist / snaptutorial.com
CSEC 610 Education Specialist / snaptutorial.comMcdonaldRyan78
 
CYB 610 Effective Communication/tutorialrank.com
 CYB 610 Effective Communication/tutorialrank.com CYB 610 Effective Communication/tutorialrank.com
CYB 610 Effective Communication/tutorialrank.comjonhson199
 

Similar to CYB610 Project Common computing platforms.docx (20)

Cain and AbelOphcrackStart H.docx
Cain and AbelOphcrackStart H.docxCain and AbelOphcrackStart H.docx
Cain and AbelOphcrackStart H.docx
 
Cyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comCyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.com
 
The Technical Report and Executive SummaryTechnical report Your.docx
The Technical Report and Executive SummaryTechnical report Your.docxThe Technical Report and Executive SummaryTechnical report Your.docx
The Technical Report and Executive SummaryTechnical report Your.docx
 
Running head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docx
Running head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docxRunning head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docx
Running head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docx
 
Cyb 610 Believe Possibilities / snaptutorial.com
Cyb 610  Believe Possibilities / snaptutorial.comCyb 610  Believe Possibilities / snaptutorial.com
Cyb 610 Believe Possibilities / snaptutorial.com
 
Cyb 610 Enhance teaching / snaptutorial.com
Cyb 610   Enhance teaching / snaptutorial.comCyb 610   Enhance teaching / snaptutorial.com
Cyb 610 Enhance teaching / snaptutorial.com
 
Cyb 610 Education Organization-snaptutorial.com
Cyb 610 Education Organization-snaptutorial.comCyb 610 Education Organization-snaptutorial.com
Cyb 610 Education Organization-snaptutorial.com
 
CST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.comCST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.com
 
CYB 610 Effective Communication - snaptutorial.com
CYB 610 Effective Communication - snaptutorial.comCYB 610 Effective Communication - snaptutorial.com
CYB 610 Effective Communication - snaptutorial.com
 
CYB 610 Exceptional Education - snaptutorial.com
CYB 610   Exceptional Education - snaptutorial.comCYB 610   Exceptional Education - snaptutorial.com
CYB 610 Exceptional Education - snaptutorial.com
 
Cst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.comCst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.com
 
Cst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.comCst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.com
 
Cst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.comCst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.com
 
Cst 610 Believe Possibilities / snaptutorial.com
Cst 610  Believe Possibilities / snaptutorial.comCst 610  Believe Possibilities / snaptutorial.com
Cst 610 Believe Possibilities / snaptutorial.com
 
CST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.comCST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.com
 
Cst 610 Enhance teaching / snaptutorial.com
Cst 610  Enhance teaching / snaptutorial.comCst 610  Enhance teaching / snaptutorial.com
Cst 610 Enhance teaching / snaptutorial.com
 
Cyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.comCyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.com
 
CST 610 Effective Communication - snaptutorial.com
CST 610 Effective Communication - snaptutorial.comCST 610 Effective Communication - snaptutorial.com
CST 610 Effective Communication - snaptutorial.com
 
CSEC 610 Education Specialist / snaptutorial.com
CSEC 610 Education Specialist / snaptutorial.comCSEC 610 Education Specialist / snaptutorial.com
CSEC 610 Education Specialist / snaptutorial.com
 
CYB 610 Effective Communication/tutorialrank.com
 CYB 610 Effective Communication/tutorialrank.com CYB 610 Effective Communication/tutorialrank.com
CYB 610 Effective Communication/tutorialrank.com
 

More from write5

This week we are going to participate in a.docx
This week we are going to participate in a.docxThis week we are going to participate in a.docx
This week we are going to participate in a.docxwrite5
 
This week begins an overview of the Research In.docx
This week begins an overview of the Research In.docxThis week begins an overview of the Research In.docx
This week begins an overview of the Research In.docxwrite5
 
This week you are exploring what it means to have.docx
This week you are exploring what it means to have.docxThis week you are exploring what it means to have.docx
This week you are exploring what it means to have.docxwrite5
 
Watch the TED Talk for Chapter 8 on Pay.docx
Watch the TED Talk for Chapter 8 on Pay.docxWatch the TED Talk for Chapter 8 on Pay.docx
Watch the TED Talk for Chapter 8 on Pay.docxwrite5
 
The value of diversity in groups and society is continually.docx
The value of diversity in groups and society is continually.docxThe value of diversity in groups and society is continually.docx
The value of diversity in groups and society is continually.docxwrite5
 
The Travels of Sir John Mandeville.docx
The Travels of Sir John Mandeville.docxThe Travels of Sir John Mandeville.docx
The Travels of Sir John Mandeville.docxwrite5
 
This will enable you to understanding the extent to which.docx
This will enable you to understanding the extent to which.docxThis will enable you to understanding the extent to which.docx
This will enable you to understanding the extent to which.docxwrite5
 
The Superfund website will have information about contaminated how.docx
The Superfund website will have information about contaminated how.docxThe Superfund website will have information about contaminated how.docx
The Superfund website will have information about contaminated how.docxwrite5
 
The Strengths and Weaknesses of the North and South in.docx
The Strengths and Weaknesses of the North and South in.docxThe Strengths and Weaknesses of the North and South in.docx
The Strengths and Weaknesses of the North and South in.docxwrite5
 
This assignment will help you to explain the concept of.docx
This assignment will help you to explain the concept of.docxThis assignment will help you to explain the concept of.docx
This assignment will help you to explain the concept of.docxwrite5
 
The Institutional Structure of the Communist.docx
The Institutional Structure of the Communist.docxThe Institutional Structure of the Communist.docx
The Institutional Structure of the Communist.docxwrite5
 
The next couple of weeks begins an overview of the.docx
The next couple of weeks begins an overview of the.docxThe next couple of weeks begins an overview of the.docx
The next couple of weeks begins an overview of the.docxwrite5
 
Two general technology trends in my workplace are that EHRs.docx
Two general technology trends in my workplace are that EHRs.docxTwo general technology trends in my workplace are that EHRs.docx
Two general technology trends in my workplace are that EHRs.docxwrite5
 
Two of the religions that we have studied in the.docx
Two of the religions that we have studied in the.docxTwo of the religions that we have studied in the.docx
Two of the religions that we have studied in the.docxwrite5
 
XYZ restaurant owner wishes to extend his current operation by.docx
XYZ restaurant owner wishes to extend his current operation by.docxXYZ restaurant owner wishes to extend his current operation by.docx
XYZ restaurant owner wishes to extend his current operation by.docxwrite5
 
Write at least 4 paragraphs in your own words after.docx
Write at least 4 paragraphs in your own words after.docxWrite at least 4 paragraphs in your own words after.docx
Write at least 4 paragraphs in your own words after.docxwrite5
 
You mention in your post that you will be.docx
You mention in your post that you will be.docxYou mention in your post that you will be.docx
You mention in your post that you will be.docxwrite5
 
to in which you draw from the assigned.docx
to in which you draw from the assigned.docxto in which you draw from the assigned.docx
to in which you draw from the assigned.docxwrite5
 
Title Executive Order on Improving the Cybersecurity.docx
Title Executive Order on Improving the Cybersecurity.docxTitle Executive Order on Improving the Cybersecurity.docx
Title Executive Order on Improving the Cybersecurity.docxwrite5
 
Write a to paper in APA format that.docx
Write a to paper in APA format that.docxWrite a to paper in APA format that.docx
Write a to paper in APA format that.docxwrite5
 

More from write5 (20)

This week we are going to participate in a.docx
This week we are going to participate in a.docxThis week we are going to participate in a.docx
This week we are going to participate in a.docx
 
This week begins an overview of the Research In.docx
This week begins an overview of the Research In.docxThis week begins an overview of the Research In.docx
This week begins an overview of the Research In.docx
 
This week you are exploring what it means to have.docx
This week you are exploring what it means to have.docxThis week you are exploring what it means to have.docx
This week you are exploring what it means to have.docx
 
Watch the TED Talk for Chapter 8 on Pay.docx
Watch the TED Talk for Chapter 8 on Pay.docxWatch the TED Talk for Chapter 8 on Pay.docx
Watch the TED Talk for Chapter 8 on Pay.docx
 
The value of diversity in groups and society is continually.docx
The value of diversity in groups and society is continually.docxThe value of diversity in groups and society is continually.docx
The value of diversity in groups and society is continually.docx
 
The Travels of Sir John Mandeville.docx
The Travels of Sir John Mandeville.docxThe Travels of Sir John Mandeville.docx
The Travels of Sir John Mandeville.docx
 
This will enable you to understanding the extent to which.docx
This will enable you to understanding the extent to which.docxThis will enable you to understanding the extent to which.docx
This will enable you to understanding the extent to which.docx
 
The Superfund website will have information about contaminated how.docx
The Superfund website will have information about contaminated how.docxThe Superfund website will have information about contaminated how.docx
The Superfund website will have information about contaminated how.docx
 
The Strengths and Weaknesses of the North and South in.docx
The Strengths and Weaknesses of the North and South in.docxThe Strengths and Weaknesses of the North and South in.docx
The Strengths and Weaknesses of the North and South in.docx
 
This assignment will help you to explain the concept of.docx
This assignment will help you to explain the concept of.docxThis assignment will help you to explain the concept of.docx
This assignment will help you to explain the concept of.docx
 
The Institutional Structure of the Communist.docx
The Institutional Structure of the Communist.docxThe Institutional Structure of the Communist.docx
The Institutional Structure of the Communist.docx
 
The next couple of weeks begins an overview of the.docx
The next couple of weeks begins an overview of the.docxThe next couple of weeks begins an overview of the.docx
The next couple of weeks begins an overview of the.docx
 
Two general technology trends in my workplace are that EHRs.docx
Two general technology trends in my workplace are that EHRs.docxTwo general technology trends in my workplace are that EHRs.docx
Two general technology trends in my workplace are that EHRs.docx
 
Two of the religions that we have studied in the.docx
Two of the religions that we have studied in the.docxTwo of the religions that we have studied in the.docx
Two of the religions that we have studied in the.docx
 
XYZ restaurant owner wishes to extend his current operation by.docx
XYZ restaurant owner wishes to extend his current operation by.docxXYZ restaurant owner wishes to extend his current operation by.docx
XYZ restaurant owner wishes to extend his current operation by.docx
 
Write at least 4 paragraphs in your own words after.docx
Write at least 4 paragraphs in your own words after.docxWrite at least 4 paragraphs in your own words after.docx
Write at least 4 paragraphs in your own words after.docx
 
You mention in your post that you will be.docx
You mention in your post that you will be.docxYou mention in your post that you will be.docx
You mention in your post that you will be.docx
 
to in which you draw from the assigned.docx
to in which you draw from the assigned.docxto in which you draw from the assigned.docx
to in which you draw from the assigned.docx
 
Title Executive Order on Improving the Cybersecurity.docx
Title Executive Order on Improving the Cybersecurity.docxTitle Executive Order on Improving the Cybersecurity.docx
Title Executive Order on Improving the Cybersecurity.docx
 
Write a to paper in APA format that.docx
Write a to paper in APA format that.docxWrite a to paper in APA format that.docx
Write a to paper in APA format that.docx
 

Recently uploaded

Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationNeilDeclaro1
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfstareducators107
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptxJoelynRubio1
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17Celine George
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningMarc Dusseiller Dusjagr
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 

Recently uploaded (20)

Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 

CYB610 Project Common computing platforms.docx

  • 1. CYB610 Project 3: Common computing platforms You are an Information Assurance Management Officer, IAMO, at an organization of your choosing. One morning, as you’re getting ready for work, you see an email from Karen, your manager. She asks you to come to her office as soon as you get in. When you arrive to your work, you head straight to Karen’s office. “Sorry for the impromptu meeting,” she says, “but we have a bit of an emergency. There’s been a security breach at the Office of Personnel Management.” We don’t know how this happened, but we need to make sure it doesn’t happen again, says Karen. You’ll be receiving an email with more information on the security breach. Use this info to assess the information system vulnerabilities of the Office of Personnel Management. At your desk, you open Karen’s email. She’s given you an OPM report from the Office of theInspector General, or OIG. You have studied the OPM OIG report and found that the hackers were able to gain access through compromised credentials. The security breach could have been prevented, if the Office of Personnel Management, or OPM, had abided by previous auditing reports and security findings. In addition, access to the databases could have been prevented by implementing various encryption schemas and could have been identified after running regularly scheduled scans of the systems. Karen and the rest of the leadership team want you to compile your findings into a Security Assessment Report or SAR. You will also create a Risk Assessment Report, or RAR, in which you identify threats, vulnerabilities, risks, and likelihood of exploitation and suggested remediation The security posture of the information systems infrastructure of an organization should be regularly monitored and assessed (including software, hardware, firmware components, governance policies, and implementation of security controls). The monitoring and assessment of the infrastructure and its components, policies, and processes should also account for changes and new procurements that are sure to follow in order to stay in step with ever-changing information system technologies. The data breach at the Office of Personnel Management (OPM) is one of the largest in US government history. It provides a series of lessons learned for other organizations in industry and the public sector. Some critical security practices, such as lack of diligence to security controls and management of changes to the information systems infrastructure were cited as contributors to the massive data breach in the OPM Office of the Inspector General’s (OIG) Final Audit Report, which can be found in open source searches. Some of the findings in the report include: weak authentication mechanisms; lack of a plan for life-cycle management of the information systems; lack of a configuration management and change management plan; lack of inventory of systems, servers, databases, and network devices; lack of mature
  • 2. vulnerability scanning tools; lack of valid authorizations for many systems, and lack of plans of action to remedy the findings of previous audits. The breach ultimately resulted in removal of OPM’s top leadership. The impact of the breach on the livelihoods of millions of people is ongoing and may never be fully known. There is a critical need for security programs that can assess vulnerabilities and provide mitigations.There are nine steps that will help you create your final deliverables. The deliverables for this project are as follows:Security Assessment Report (SAR): This should be an 8-10 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.Risk Assessment Report (RAR): This report should be a 5-6 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.Step 1: Enterprise Network DiagramDuring Project One, you researched a hypothetical or actual organization of your choice. You had to understand the goals of the organization and the types of systems that would fulfill those goals. You will now research and learn about types of networks and their secure constructs that may be used in organizations to accomplish the functions of the organization’s mission. You will propose a local area network (LAN) and a wide area network (WAN) for the organization, define the systems environment, and incorporate this information in a network diagram. Discuss the security benefits of your chosen network design. Read about the following computing platforms available for networks and discuss how these platforms could be implemented in your organization. Include the rationale for all platforms you choose to include in your network design.common computing platforms cloud computing distributed computing centralized computing secure programming fundamentals Step 2: Enterprise ThreatsReview the OIG report on the OPM breach that you were asked to research and read about at the beginning of the project. The OIG report included numerous security deficiencies that likely left OPM networks vulnerable to being breached. In addition to those external threats, the report also describes the ways OPM was vulnerable to insider threats. The information about the breach could be classified as threat intelligence. Define threat intelligence and explain what kind of threat intelligence is known about the OPM breach.You just provided detailed background information on your organization. Next, you’ll describe threats to your organization’s system. Before you get started, select and explore the contents of the following link: insider threats (also known as internal threats). As you’re reading, take note of which insider threats are a risk to your organization.Now, differentiate between the external threats to the system and the insider threats. Identify where these threats can occur in the previously created diagrams. Relate the OPM threat intelligence to your organization. How likely is it that a similar attack will occur at your organization?Click here to request for this assignment help#CYB610 #Project #Common #computing #platforms