Organizational/ Industrial Assignment
Project 4: Attack Vector Solutions
Start Here
Attack Vector Solutions
[Music]
As you complete your morning login routine, you notice an urgent
message from John, the chief technology officer.
“See Me ASAP!!”
You grab your tablet and stylus and rush to John’s office.
John gives you a friendly greeting as you enter his office, but he looks
concerned.
“Good morning,” John says. “I appreciate you dropping everything and
coming by so quickly. I need your help with a high-level matter. Top
executives are meeting to prepare for the quarterly meeting with the
board of directors. They would like to review the current vulnerabilities
and threats that the organization has in regards to our technology,
people, and cybersecurity policies. The board will also be asking about
our ability to educate the organization’s population on not only our
policies and practices, but also the need for them. I need to prepare a
presentation for the board meeting. However, I have several other
urgent matters to oversee.”
John continues, “I need you to prepare my presentation by reviewing
common attack vectors, analyzing our vulnerabilities, and preparing
recommendations on what we should do to protect ourselves. In
addition, I need a brochure to show the board what we are doing to
educate the organization on these issues. I need this review in two
weeks.”
You are grateful for John’s trust in allowing you to put together his
presentation for the board, and now you’re eager to show that his faith
in you is justified.
You will have to combine your technical and research abilities to come
up with the recommendations, and present them in a professional
manner.
[Music]
Organizations must implement countermeasures to protect information
and data that are vulnerable to cyberattacks. As new security threats
are introduced, these countermeasures must be evaluated and
improved.