For This or a Similar Paper Click To Order Now

Project Part 1: Current Security Threats Scenario It is your first day at the
Project Part 1: Current Security Threats Scenario It is your first day at the job in the information security department, and you are called for a meeting. In the meeting the need for strengthening the information security for the college is discussed, and everyone agrees that the first step in this direction is to identify the top five threats that are a potential risk to Aim Higher College. The college’s administrative staff and faculty run the latest version of Microsoft Windows on their primary workstations, whereas students’ laptops may run Windows or macOS. The college’s web servers run on Linux; however, all other servers are Windows Server-based. Student, staff, and faculty mobile devices, such as tablets and smartphones, run on iOS or Android; all mobile devices can connect to the campus network. Tasks You have been given the responsibility to determine the top five threats that Aim Higher College faces. You asked your supervisor for support in this task and he gave you the following resources that might be useful in your research and analysis:  Microsoft Security Advisories and Bulletins (https://docs.microsoft.com/en-us/security-updates/)  Common Vulnerabilities and Exposure (CVE) database search (http://cve.mitre.org/find/index.html)  Security organizations, such as Secunia (http://secunia.com/) Your supervisor has also asked you to consider the following questions as you shortlist the threats:  What threats are new this year, and which have become more prevalent?  Why are these threats more common and why are they important?  What threats remain constant from year to year? Why?  What threats do you believe will become more critical in the next 12 months? Why?  What is the likelihood of an exploit affecting Aim Higher College, and which operating system(s) does it target?  Do you require that anyone accessing the Wi-Fi or network have antivirus on their computer/laptop? If so, how do you enforce this? What are the costs and befits of this policy if enforced?  If attacked, how can a contingency plan help? With these considerations in mind, write a summary report of the top five threats to Aim Higher College. Briefly explain why you have selected them and what effect they might have on the institution or its students, employees, graduates, or other communities on campus. With the security summary, answer the questions provided above citing scholarly resources as necessary.

For This or a Similar Paper Click To Order Now

Leave a Reply

Your email address will not be published. Required fields are marked *

For This or a Similar Paper Click To Order Now