Quality Papers

Custom Academic Papers

100% Original, Plagiarism Free, Customized to your instructions!

hroughout this course you will study the different roles tha

hroughout this course you will study the different roles that contribute to an organization’s information security and assurance.Part A:Select an organization you wish to explore and use throughout the course. As for the company, it’s an organization you will choose so it can be hypothetical, the current organization you may work for, a well-known and real-life public or private organization (e.g. Amazon, Google, Bank of America, etc.). This part is up to you. As you make your selection, keep in mind that you will explore the following roles in the organization: Cyber Security Threat Analyst, Penetration Tester, Cyber Security Engineer, Risk Management Analyst, and Software Engineer. You need sufficient knowledge of the organization you select to complete these security assignments.Part B:A Cyber Security Threat Analyst conducts analysis, digital forensics, and targeting to identify, monitor, assess, and counter cyber-attack threats against information systems, critical infrastructure, and cyber-related interests.Take on the role of a Cyber Security Threat Analyst for the organization you select. Completethe Threats, Attacks, and Vulnerability Assessment Template to create an assessment document. Regarding the system model referenced in the template, the system model can be presented in the form of a network diagram since the assets will cover cloud, network, information systems, etc. You can create a diagram using Microsoft Visio, Lucidchart, or use one from your web and/or research. A sample diagram is attached for ideas and consideration. This attachment is a sample and can’t be used for the assignment since it doesn’t cover all of what’s needed for this particular assignment.

Can't find what you are looking for?

Post your question on solvingessays and get help from one of our expert tutors in topics ranging from mathematics to rocket science!