Mitigating Against Malware Attacks

Assignment Details

Unit 4 Assignment: Mitigating Against Malware Attacks

Outcome addressed in this activity:

IT545-2: Synthesize knowledge of cybersecurity threats to assess risk in wireless, mobile, and cloud infrastructures, as well as disruptive technologies.

Purpose

The purpose of the Unit 4 Assignment is for you to define a mitigation strategy for a malware threat being introduced into the system. You should assume the malware threat is similar to the one you worked with during this week’s lab.

Assignment Instructions

  1. You must complete the Unit 4 Lab prior to completing this assignment.
  2. You are a cybersecurity professional in a research and development firm working on medical research to identify effective treatments for several diseases. It is known that a foreign state agent recently hacked a similar type of research organization through the use of malware, and many patents and other intellectual property were stolen. Your CEO and CIO want to ensure that their organizations systems are protected against this attack. They have asked you to perform a high-level risk assessment and provide a risk management approach related to this type of malware attack. Assume the following for the assignment:
  • The organization has an outward-facing website that provides information on the progress of research and presents general news of interest to its followers. This website’s web server is in the organizations demilitarized zone (DMZ). The DMZ uses a single firewall system. Users can request information by submitting a form.
  • Servers on the internal network houses several databases. One holds all current patent information for patents held by the organization. The second database holds the researchers notes and all research project information for projects that are in progress. The patent database is encrypted. There is also a collaboration area where researchers who work together can share notes and ideas. A third database houses employee information.
  • Also, an email server, print servers, and application servers are on the internal network.
  • The organization does not use any cloud computing. An incremental backup of the servers and databases is made daily and stored in the same building.
  • The organization has biometric identification on the external door and all internal lab rooms and server rooms. There are no security cameras.
  1. Use the following risk management approach to determine where compromises may exist, what the consequences of those compromises are, and controls and methods to reduce the likelihood or severity of the compromise. Identify at least two vulnerabilities, threats, and risks. Recommend what you think is the best control for each vulnerability, threat, and risk identified.

Assignment Requirements

The paper should be at least three pages, use 12-point Times New Roman, and be in APA format.

For more information on APA Style formatting, refer to the resources in the Academic Tools area of this course.

Get fast, custom help from our academic experts, any time of day.

Place your order now for a similar assignment and have exceptional work written by our team of experts.

✔Secure ✔ 100% Original ✔ On Time Delivery

How To Order?

How Does the Order Process Work?

Fill Out the Order Form

Complete the form, submitting as many details & instructions concerning the requested academic paper as possible. We will pick a suitable author after you pay for the services.

Make the Payment

Proceed with the payment safely, get an email notification of payment confirmation, and receive your Customer Area sign-in details.

Download the Final Paper

Once the Quality Department ensures the proper quality and congruence with all of the requirements, you will receive an email notification. Now, you can access and save the file from your Customer Area.

Our guarantees

What Else Can You 100% Get With a Professional Essay

 
Complete confidentiality

Be assured of comprehensive protection of all your data. From order placement to downloading final papers – professional essay assistance remains confidential & anonymous.

Direct chat with a writer

Keep in touch with your professional essay writer via direct chat to always be keep-up-to-date on your order progress, check paper drafts, or make additional revisions if needed.

Unlimited free revisions

After your order is completed, the best professional essay writers can revise papers as many times as you need to make them flawless. Your total satisfaction is our main priority.

Money-back guarantee

Professional essay writing service is legit & transparent, so you can entirely rely on the writer's responsibility & readiness to fix all the issues. If they cannot do it, you'll get a refund.

What We do.....

Writing

Editing

Rewriting

Proofreading

Research activities

Revision