Cumberlands Security Concerns and Mitigation Strategies Paper
Assignment Requirements
You are provided a handout to do this assignment.
Tasks
Identify a networked technology you use at home, at work, or as a personal convenience. Research and identify three potential threats to endpoint security of the device, and detail a mitigation mechanism for each threat. Also explain why your mitigation strategies would work. Submit the report to your instructor.
Required Resources
Textbook
Internet
Handouts:
Security Concerns and Mitigation Strategies
Hosts
RS Assignment 3 Security Concerns and Mitigation Strategies Template.docx (YOU MUST USE THIS TEMPLATE TO GET FULL CREDIT)
Submission Requirements
Format: Microsoft Word
Font: Arial, Size 12, Double-Space
Citation Style: APA
Length: 22 pages
Spelling & Grammar count
Self-Assessment Checklist
I identified at least one personally significant networked technology.
I researched and identified three appropriate threats associated with the technology.
I provided a mitigation strategy for each identified threat.
I explained why my mitigation strategies would work.
“Place your order now for a similar assignment and have exceptional work written by our team of experts, guaranteeing you A results.”
Attachments
20190525153515rs_assignment_3_security_concerns_and_mitigation_strategies_template__1_ (13 kB)