Stages of designing the information assurance plan.
In your role as a highly paid consultant, you are given a list of potential threats Word Document to and vulnerabilities of the current communication security protocols of an organization. You are asked to provide quantitative data to measure the likelihood that any of these threats will actually occur for the information assets of the client. Conduct research and describe resources you found that might provide insight into measuring the likelihood that some of the threats would actually occur. In the explanation, include whether you see a trend in resources that might indicate a specific industry is particularly involved in gathering this kind of data. Additionally, evaluate which communication security protocols are more effective and provide an explanation.
For the Module Six assignment, students will be placed into the role of an IT consultant whose task is to evaluate an existing organization’s security protocols. Once the protocols have been analyzed, students will synthesize this knowledge to provide insight into the likelihood of certain threats occurring. The skills acquired from this exercise will prove to be beneficial during the final stages of designing the information assurance plan.
Prompt
In your role as a highly paid consultant, you are given a list of potential threats to and vulnerabilities of the current communication security protocols of an organization. You are asked to provide quantitative data to measure the likelihood that any of these threats will actually occur for the information assets of the client. Conduct research and describe resources you found that might provide insight into measuring the likelihood that some of the threats would actually occur. In the explanation, include whether you see a trend in resources that might indicate a specific industry is particularly involved in gathering this kind of data. Additionally, evaluate which communication security protocols are more effective and provide an explanation.
Measuring the Likelihood of Security Threats
There are a number of resources available that can be used to measure the likelihood of security threats. These resources include:
- Security Threat Intelligence Reports: These reports provide information on the latest security threats and vulnerabilities. They often include data on the likelihood of these threats occurring.
- Security Benchmarks: These benchmarks provide a set of best practices for security. They can be used to assess the current security posture of an organization and to identify areas where improvements can be made.
- Security Metrics: These metrics provide a way to measure the effectiveness of security controls. They can be used to track the progress of an organization's security program and to identify areas where improvements are needed.
- The sophistication of the threat actor
- The availability of exploit code
- The motivation of the threat actor
- The value of the information assets
- The current security posture of the organization
- Transport Layer Security (TLS): TLS is a cryptographic protocol that is used to secure communications between two parties. TLS is used to protect a wide variety of applications, including web browsers, email clients, and file transfer protocols.
- Secure Shell (SSH): SSH is a cryptographic protocol that is used to securely access remote computers. SSH is often used to manage servers and to transfer files between computers.
- Virtual Private Networks (VPNs): VPNs are used to create secure tunnels between two networks. VPNs can be used to protect communications between employees and corporate networks, or between different corporate networks.