Popular in Course
verified elite notetaker
Popular in Department
This 0 page Study Guide was uploaded by kimwood Notetaker on Monday November 9, 2015. The Study Guide belongs to a course at a university taught by a professor in Fall. Since its upload, it has received 20 views.
Reviews for ISSC363_Assignment_8
Report this Material
What is Karma?
Karma is the currency of StudySoup.
You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!
Date Created: 11/09/15
FAVORITE COURSE TOPIC Favorite Course Topic Brian Page American Military University FAVORITE COURSE TOPIC 2 Introduction The course topic that I was most interested in was in week 7 Risk mitigation and Security Controls I do this as a part of my job on a daily basis so it was nice to learn about new and intriguing ways to mitigate risks I believe that one of the most successful ways to mitigate risk is to overlap countermeasures The most interesting part about this particular risk mitigation technique is that most of us do it on a daily basis only we do not realize it Week 7 brought some particularly difficult challenges for me that being said the most difficult challenge I found was the Lab Vulnerability Scans and NMAP While completing the Lab exercise for week 7 I found that it was a very tedious process to go through the scan report and identify the vulnerabilities with the way the report was organized I chose to write the summary based on the vulnerabilities that I believed that the upper echelon of the company would want to identify and address thus the medium and high categories were included in the report along with recommendations on how to mitigate of fis the issue This has actually helped me in my actual job because part of my job is to identify possible vulnerabilities and work on ways to mitigate them Taking what management wants to see and having a plan that you can initiate immediately to remedy the vulnerability is key along with the identification of only the vulnerabilities that need to be addressed immediately Executive Summary I tend to think that I am a pretty decent writer when it comes to reports however during the week 7 Lab assignment I was having a particularly difficult time with how exactly an executive summary needed to be worded and what information needed to be vocalized within it FAVORITE COURSE TOPIC 3 I turned to one of the Department of Defense instructions to guide me in the right direction along with the course material that we were provided Using these items I believe that I was able to construct a pretty decent Executive Summary As the reading suggested scripts are commonly used to automate functions of the network administrators What happens when the scripts are not updated or ran in the correct order At my work we use scripts just as the ones described in our reading to conduct incremental backups of patient data If the wrong script is ran at the wrong time then the wrong information will be saved to the backup tapes which are changed on a daily basis If this scenario were to indeed happen at my workplace we would have to completely start over with the backups system basically in the event that a catastrophic outage occurred we would not be able to restore the services because the backup was corrupted Conclusion There are many different ways that vulnerabilities and threats can be identified and mitigated some threats are caused by human error and others are caused by malicious attackers looking to gain information for financial or personal motivations NMAP and Nessus are just two of the scanners that can be used to identify and remediate risks Personal preference dictates to the Risk Assessor as to how the Assessment should proceed and what tools are used to identify vulnerabilities and tie them to specific exploitations FAVORITE COURSE TOPIC Works Cited Gibson D 2010 Managing Risk in Information Systems Sudbury MA Jones amp Bartlett Learning ISBN 9780763791872
Are you sure you want to buy this material for
You're already Subscribed!
Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'