Identify the top threats to a school’s systems and network. Analyze port and vulnerability scan data to understand the security risks and threats to an organization, and explain them to management.

Threat and Vulnerability Analysis, and Incident Response

Purpose
Part of being a security official is analyzing the current situation and preparing an action plan for risk assessment, prevention, and post incident response. The purpose of this project is to step into the role of a security analyst and give a recommendation to the situation provided.
Required Source Information and Tools
The following tools and resources will be needed to complete this project:
Course textbook
Access to the Internet
Scan Output: Zenmap Intense Scan Results
Learning Objectives and Outcomes
You will be able to:
Identify the top threats to a school’s systems and network.
Analyze port and vulnerability scan data to understand the security risks and threats to an organization, and explain them to management.
Use incident response data to explain the attacks and the methods of an exploit.
Given all of the above, prepare an incident response plan to address keeping the company functional should there be a problem.
Overall Project Scenario
Aim Higher College is a fictitious institution located in the United States. The college offers undergraduate and graduate courses in domains, such as business management, information security, and nursing. Imagine that you have a new job at Aim Higher College as an information security analyst. Throughout this course, you will analyze the threats and vulnerabilities of Aim Higher College and recommend controls to secure the college’s information systems.
Deliverables
This project is divided into two parts, as follows:
Project Part 1: Current Security Threats
Project Part 2: Identify Vulnerabilities in IT Security
Submission Requirements
Format: Microsoft Word
Font: Times New Roman, size 12, double-space
Citation Style: APA 6th edition

Identify the top threats to a school’s systems and network. Analyze port and vulnerability scan data to understand the security risks and threats to an organization, and explain them to management.
Scroll to top