Security assessment and vulnerability management MCY 630 Security Architecture
Please kindly follow all instructions on the paper. PLEAASE. The assignment is titled, MODULE 6..
Requirements: Per instruction
Module 6: Assignment Security assessment and vulnerability management MCY 630 Security Architecture Assignment Submission Instructions Submission requirements: assignment File format: MSWord or pdf (preferred) Report requirements • Include your name and assignment title at the top of the document. • Number the questions and answers and answer each question in your submission in sequence. • For each response, include the required text as well as any necessary images and diagrams. • Use black font color for texts • If uploading an MSWord format file, view the uploaded file from Canvas to make sure that the layout of images and texts are not overlapping in the report. If the contents seem to have moved around, upload a pdf instead of an MSWord file. Questions 1. (20 points) Exploring CSET • Download and install the CSET standalone application o URL: https://cset-download.inl.gov/ o Requires: Windows OS, Download information (Org Type: State, Sector: IT, Industry: Other, NAISC Code: 611310) • Note: The CSET tool is updated regularly, and the interface may change with each version. o Read all the instructions below and choose the options accordingly to fulfil the requirements as necessary. • Start a new assessment – “My MCY630 Assessment” (fill other fields as necessary). • Assessment option: Maturity Model and Network Diagram • Fill necessary demographics fields with reasonable assumptions • Maturity Models: Select Ransomware Readiness Assessment (RRA) • Security Assurance Level (SAL): Methodology: Simple, Overall SAL: Low, Confidentiality/Integrity/Availability: Low • Select “Create a Network Diagram” – You will be provided with some standard network architecture options. Select DCS (which stands for Distributed Control System). Make any changes if you need (not necessary) and select “Return to CSET” • Complete all Ransomware Readiness Assessment questions with reasonable assumptions. • Complete all Diagram Component Questions with reasonable assumptions. • Study the results of your assessment. • Fill in the High-Level Assessment Description, Executive Summary and Comments text-boxes for documentation. • In the final “Results > Reports” tab, go through the documentation generated from your assessment. • Use the “print to PDF” option to generate the PDF for the following: o (Document 1) Standard and Diagram – Executive Summary and o (Document 2) Ransomware Readiness Assessment – RRA Report 2. (20 points) Exploring Microsoft TMT • Download and install the Microsoft TMT standalone application o URL: https://www.microsoft.com/en-us/securityengineering/sdl/threatmodeling • Follow the “Getting Started” online guide to build a sample model (optional: feel free to add items to your DFD) • Follow the “Feature Overview” online guide explore Element Properties, Messages, and Analysis View options. • Finally, use the report generation option to export the threat modeling report (Document 3) 3. (5 + 5 points) Task Report Create a task report to summarize your actions for the above two tasks. Include a reflection on the application usage, how you feel these tools could be beneficial, the type of information you could extract from the reports, and your overall experience with the activity. Submit Documents 1, 2, and 3 along with the task report.
COI Labs Windows VM Access (for non-Windows users) 1. Introduction Do you need a Windows Virtual Machine? Some labs and/or assignments may require the installation and usage of software applications which are only available for Windows. If you are a non-Windows user (e.g. MacOS), you may need to have access to a Windows PC for being able to complete the assignment task. If you can manage a Windows PC on your own, feel free to use that. However, in case you are unable to find a Windows PC, you may use the Windows VM provided by NKU for the College of Informatics (COI) students. What is COI Labs Windows VM? The COI provides Windows OS-based virtual machines for students, for both on-campus and off-campus usage. Important: These VMs are not persistent, i.e., the VMs are wiped after a period of inactivity or if the student closes the session. Hence, it is important that you perform the tasks in one sitting. Once completed, you will need to transfer all the saved work from the VM to your personal PC. How do I transfer my work saved on the COI Labs Windows VM to my personal PC? As the COI Labs Windows VM is not persistent, you need to transfer all your work to your personal PC by any of the following means: • Upload your files to a file sharing platform (Dropbox, OneDrive, Google Drive, etc.) from the VM • Email yourself the files from the VM 2. Accessing COI Labs Windows Virtual Machines There are three recommended ways for accessing the virtual machines provided for you. The virtual machines placed within a protected sub-network within NKU’s primary network. Method 1: Accessing COI Labs desktop via web browser Follow the steps below in sequence for accessing your COI Labs Windows VM: 1. Point your web browser to https://view.nku.edu 2. Click “VMWare Horizon HTML Access” 3. Login with your NKU username and password 4. You will see some options listed as square icons. Select “COI Labs”. You will be presented with a new Windows desktop. Method 2: Accessing COI Labs desktop via VMWare Horizon Client Follow the steps below in sequence for accessing your COI Labs Windows VM: 1. Point your web browser to https://view.nku.edu 2. Click “Install VMware Horizon Client” 3. From the download options, click the “Go to Downloads” link next to “VMWare Horizon Client for Windows”. 4. Install VMWare Horizon on your desktop, accepting all defaults. Launch the Horizon client on your computer. 5. Select “Add Server”. 6. When prompted for a connection server, enter “view.nku.edu” and press Connect. 7. Use your NKU username and password. Your username should be provided in the format of NKUusername (make sure the NKU part precedes your username, without spaces). Additional Info: Setting up NKU VPN Access to the https://view.nku.edu URL should work even when you are not within NKU’s network. In case you are unable to access the URL from off-campus location, try connecting remotely via VPN. Instructions for installing the NKU VPN client on your computer are as follows: • Windows: https://servicedesk.nku.edu/TDClient/2436/Portal/KB/ArticleDet?ID=122619 • Mac: https://servicedesk.nku.edu/TDClient/2436/Portal/KB/ArticleDet?ID=122619
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
