Analyze port and vulnerability scan data to understand the security risks and threats to an organization,and explain them to management.

Threat and Vulnerability Analysis,and Incident Response

Part of being a security official is analyzing the current situation and preparing an action plan for risk assessment, prevention, and post incident response. The purpose of this project is to step into the role of a security analyst and give a recommendation to the situation provided.
Required Source Information and Tools

The following tools and resources will be needed to complete this project:
Course textbook
Access to the Internet
Scan Output: Zenmap Intense Scan Results
Learning Objectives and Outcomes
You will be able to:

Identify the top threats to a school’s systems and network.

Analyze port and vulnerability scan data to understand the security risks and threats to an organization,and explain them to management.

Use incident response data to explain the attacks and the methods of an exploit.

Given all of the above, prepare an incident response plan to address keeping the company functional should there be a problem.
Overall Project Scenario

Aim Higher College is a fictitious institution located in the United States. The college offers undergraduate and graduate courses in domains, such as business management, information security, and nursing. Imagine that you have a new job at

Aim Higher College as an information security analyst. Throughout this course, you will analyze the threats and vulnerabilities of Aim Higher College and recommend controls to secure the college’s information systems.
Deliverables
This project is divided into two parts, as follows:
Project Part 1: Current Security Threats
Project Part 2: Identify Vulnerabilities in IT Security
Submission Requirements
Format: Microsoft Word
Font: Times New Roman, size 12, double-space
Citation Style: APA 6th edition

Describe the methodology of the NIST RMF and provide details of its alignment with Systems Security Engineering

Project Paper and Presentation

Q- 1 In a 6-page paper, discuss the topic below. Develop the paper in accordance with APA 7th formatting. You must include at least 5 references, figures, and graphs.
Q-2 Also develop a 10 -slide presentation with detailed footnotes summarizing your findings.

Project Topic

1) Systems Engineering Alignment: Explore and describe the methodology of the NIST RMF and provide details of its alignment with Systems Security Engineering: A Multidisplinary Approach (Mar 2018) – NIST SP 800-160 Vol 1 and Developing Cyber Resilient Systems: A Systems Security Engineering Approach (Nov 2019) – NIST SP 800-160 Vol 2.

Describe the methodology of the NIST RMF and provide details of its alignment with Systems Security Engineering

Systems Engineering Alignment

Q- 1 In a 6-page paper, discuss the topic below. Develop the paper in accordance with APA 7th formatting. You must include at least 5 references, figures, and graphs.
Q-2 Also develop a 10 -slide presentation with detailed footnotes summarizing your findings.

Project Topic

1) Systems Engineering Alignment: Explore and describe the methodology of the NIST RMF and provide details of its alignment with Systems Security Engineering: A Multidisplinary Approach (Mar 2018) – NIST SP 800-160 Vol 1 and Developing Cyber Resilient Systems: A Systems Security Engineering Approach (Nov 2019) – NIST SP 800-160 Vol 2.

Explore and describe the methodology of the NIST RMF and provide details of its alignment with Systems Security Engineering.

Project Paper and Presentation

Q- 1 In a 6-page paper, discuss the topic below. Develop the paper in accordance with APA 7th formatting. You must include at least 5 references, figures, and graphs.
Q-2 Also develop a 10 -slide presentation with detailed footnotes summarizing your findings.

Project Topic

1) Systems Engineering Alignment: Explore and describe the methodology of the NIST RMF and provide details of its alignment with Systems Security Engineering: A Multidisplinary Approach (Mar 2018) – NIST SP 800-160 Vol 1 and Developing Cyber Resilient Systems: A Systems Security Engineering Approach (Nov 2019) – NIST SP 800-160 Vol 2.

Describe enterprise architecture (EA),the appropriate application of EA frameworks,and an overall ongoing EA program.

Enterprise Architecture Enables Processes Paper:Individual Assignment

Purpose of this Assignment

This assignment gives you the opportunity to apply your critical thinking skills and understanding of the course concepts to explain how the enterprise architecture (EA) and/or the EA program supports the other IT management processes of an organization. This assignment specifically addresses the following course outcomes:

Describe enterprise architecture (EA),the appropriate application of EA frameworks,and an overall ongoing EA program

Analyze and examine how enterprise architecture and enterprise systems influence, support, and enable an organization’s ability to contribute to strategic decision making and to respond and adapt to the business environment

Apply EA concepts to support business requirements and identify opportunities for enterprise solutions

Describe enterprise architecture (EA), the appropriate application of EA frameworks, and an overall ongoing EA program.

Zachman Framework

Enterprise Architecture
Purpose of this Assignment
This assignment gives you the opportunity to apply your research skills, analysis, and critical thinking skills to describe one of the enterprise architecture (EA) frameworks. This will provide you an opportunity to gain an in-depth understanding of one of the frameworks commonly used. This assignment specifically addresses the following course outcomes:

Describe enterprise architecture (EA), the appropriate application of EA frameworks, and an overall ongoing EA program.

Analyze and examine how enterprise architecture and enterprise systems influence, support, and enable an organization’s ability to contribute to strategic decision making and to respond and adapt to the business environment

Discuss how this capability might be helpful and to whom.

The chapter discussed the use of graphs for mapping the links between pages on the Internet.Discuss how this capability might be helpful and to whom.
Requirements:
Your discussion should be approximately 200 words.
Use a minimum of 2 sources to support your viewpoint
Read and respond to at least 2 of your peers within this discussion area (replies must be in-depth).
Correct grammar, spelling, and punctuation are expected.
Provide sources of information.

Describe in pseudocode how you would implement a graph that describes the links between pages on the Internet.

Case Study Lesson

Describe in pseudocode how you would implement a graph that describes the links between pages on the Internet.

Create a Word document – do not type your response into the Submission Text box.
Include an APA formatted title page and references page and double-space your work.
The text of your response (not including title and reference pages) should be at least one page long.

Describe the company you have chosen and the topic for which you believe data collection and analysis will benefit that company.

The Big Picture. A 1 or 2 page general description of your business (in APA format).Describe the company you have chosen and the topic for which you believe data collection and analysis will benefit that company.

You are a consultant hired to inform a company (a profit or a non-profit) why they should invest in a data analytics function and what they stand to gain. The client company is relatively sure they want such a function because they heard it produces useful predictions of some kind involving customers, suppliers, competitors and more, but they are not sure what it might cost to set up or how to do it, or what they can realistically expect to gain from it.

Pick a company to write about (public or private, profit or non-profit). Analyze the current issues important to that company and that industry. Research the current competitive environment. Research what benefits are already being provided by similar data analytics functions. Estimate the likely costs and obstacles a new data analytics function will face.

Write a 1 or 2 page proposal (an APA-style essay) to your client in which you tell them (1) what a data analytics function is and what they can expect to gain from it, and (2) generally how it should be set up (you will fill-in more details in later papers). For instance, it might be set up in a local data center on new equipment, or maybe it should be set up in the cloud, or maybe some other method. Estimate the likely project timeline (how long will it take) and estimate ballpark costs (you can revise these later).

Depending on your choices, such a data analytics function might be a small low-cost thing, or maybe it might be a higher-cost and more extensive function. In later weeks of this class you will be asked to add-on lots of additional details (in future more essays) to cover the many other topics in detail, such as the cloud, data warehousing, networks, security, and more.

 

The Essay (about 2 pages in APA style)

What is the name of the business that hired you as the consultant? You can select a real business or you can make one up. Assume they do not have a data analytics function. Who is your customer (the person that hired you)? Is it the CEO? The CIO? Someone else?
What things are important to this business? For instance, if you are writing about a company that makes paper products, then for instance the availability of wood or recycled paper is likely to be important to them. Many more things are probably important to them too, such as sales, costs, inventory, competitors, supplies, etc. Tell the customer which thing or which things they can expect to get from this new data analytics function.
How might an ongoing data analytics function (not a one-time thing) provide some of these things that are missing but are important to your client? What is a reasonable time to set up such a data analytics function?
What are estimated costs? What is your estimate of the duration of this project? (You can revise these later – for now just estimate)
Use APA-style to write this essay. Do not repeat the numbered instructions in this essay. Do not simply “Educate the reader” with definitions.