NT2580

Introduction to Information Security

Unit 2 (June 23, 2016)
Application of Security Countermeasures to Mitigate Malicious Attacks

Learning Objective
  • Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.
Key Concepts
  • Attacks, threats, and vulnerabilities in a typical IT infrastructure
  • Common security countermeasures typically found in an IT infrastructure
  • Risk assessment approach to securing an IT infrastructure
  • Risk mitigation strategies to shrink the information security gap   
Reading
  • Kim and Solomon, Chapter 3: Malicious Attacks, Threats, and Vulnerabilities.
  • Kim and Solomon, Chapter 4: The Drivers of Information Security Business.
Keywords
  • Common Vulnerabilities and Exposures (CVE)
  • Risk Management
  • Risk Mitigation
  • Security Countermeasures
  • Window of Vulnerability (WoV)
Assignments and Study Materials
  • Unit 2 Lecture Slides
  • Lab 2.1: Performing a Vulnerability Assessment
  • Project 2.2: Project Part 1 - Multi-Layered Security Plan
  • (Project Part 2: Student SSCP® Domain Research Paper - Assigned)
  • Assignment 2.3: Calculate the Window of Vulnerability
  • Assignment 2.4: Microsoft Environment Analysis
Questions and Feedback
Use the form below to ask questions or provide feedback about the concepts covered during Unit 2's session of class:

Your browser is out-of-date!

You need to update your browser to view Foliotek correctly. Update my browser now

×