Categories
Uncategorized

Threat-Vector Evaluation

In order to pass Assessment 1, you will need to:
• Apply your knowledge of information security to a given real-world problem
• Evaluate the concept of the defence-in-depth approach to cyber-defence
• Outline the threat vector given an information security scenario
• Outline the steps needed to secure a computer system and/or give recommendations for cyber-defence
• Justify the choices and selections of information security tools and techniques included in your solution to a
given scenario
This is a case study of a network and information security consultation conducted on behalf of PetMeds, an
online pet medicine supplier. You are to provide a report detailing the current cyber threats faced by the
company and to make recommendations for improvements to their network and computer systems to mitigate
the likelihood of damage from those threats. Your report needs to highlight the principles of cyber and
information security
THE ESSAY HAS TO BE BASED ON THE • Authentication and Compromised Credentials PART AS EACH
THRET IS ASIGNED TO A DIFERENT PERSON AND THEY GET MERGED AT THE END

Leave a Reply

Your email address will not be published. Required fields are marked *