Your Perfect Assignment is Just a Click Away

We Write Custom Academic Papers

100% Original, Plagiarism Free, Customized to your instructions!

glass
pen
clip
papers
heaphones

BMIS 664 Information Controls Project Assignment

BMIS 664 Information Controls Project Assignment

BMIS 664 Information Controls Project Assignment Instructions

Overview

Sophisticated computer network attacks that increase human resources, maintenance, and operation costs prompt the need for more sophisticated security techniques. Without added measures of security, the networks of organizations everywhere will be increasingly susceptible to additional types of attacks. The advancements in technology that enables different methods of attacks require security to be continuously updated as well.

Instructions

Assume that you are the information security officer of a business, and you must evaluate at least four (4) common cyber security threats using a minimum of four (4) IT controls and one (1) IT security framework. Research appropriate frameworks such as COBIT (Control Objectives for Information Technology) and the Committee of Sponsoring Organizations of the Treadway Commission (COSO) that assist with IT controls and their appropriate use to mitigate cyber security threats. Analyze the identified four (4) cyber security threats using the frameworks and four (4) IT controls on at least two (2) different operating systems by emulating their occurrence in a server environment. Use a current operating system designed for ethical hacking. At the time of this writing some examples include Kali Linux, Parrot, and BackBox.

In order to perform this analysis, if you do not have access to two different physical workstations with different operating systems it is recommended you use virtual machines. VMware and Oracle VirtualBox are examples. Search for either and download them free of charge. Subsequently, you can use open source pre-built images or install from the operating system ISO images. For instance, Kali Linux is a popular operating system that has the tools to do this analysis. Search “Kali Linux VirtualBox Image” to find a virtual box image pre-installed with Kali Linux. You can use other open source available operating systems of your choice as the systems in which to perform the testing on using Kali Linux and it’s associated security tools.

Be sure to perform the following:

· A properly formatted APA paper;

· Screenshots with visible OS dates of the network security threat assessments on the two different operating systems, at least one OS being Linux, using relevant security tools on Kali Linux or Linux alternatives;

· An evaluation of at least four (4) different cyber security threats using four (4) unique IT controls;

· Application of appropriate frameworks such as COBIT or COSO;

· An evaluation of the effectiveness of the framework and IT controls in assessing each of the cyber security threats on the two (2) different operating systems;

· Application of four (4) common security tools that can be used to address each of the four (4) different cyber security threats on the two (2) different operating systems;

· An explanation of the advantages and disadvantages of each type analysis performed on the selected threats using Kali Linux or an alternative ethical hacking operating system;

· Hint: Create Microsoft Excel spreadsheets that list the operating system, cyber security threats, frameworks, and IT controls to make relevant and supported comparisons;

· Your project must be a minimum of 1,800 words and must contain at least 7 peer-reviewed sources;

· Before being graded, all code, security tool logs/reports, server logs, access control rules, and diagrams (each) must include screenshots with a valid OS date/timestamp and a unique piece of data that shows completion on the student’s Kali Linux distribution or relevant alternative security OS. Include the screenshots in appendices in your written paper.

Order Solution Now

Our Service Charter

1. Professional & Expert Writers: Homework Discussion only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Homework Discussion are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Homework Discussion is known for timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Homework Discussion, we have put in place a team of experts who answer to all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.