NT2580
Introduction to Information Security
Unit 2 (June 23, 2016)
Application of Security Countermeasures to Mitigate Malicious Attacks
Learning Objective
- Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.
Key Concepts
- Attacks, threats, and vulnerabilities in a typical IT infrastructure
- Common security countermeasures typically found in an IT infrastructure
- Risk assessment approach to securing an IT infrastructure
- Risk mitigation strategies to shrink the information security gap
Reading
- Kim and Solomon, Chapter 3: Malicious Attacks, Threats, and Vulnerabilities.
- Kim and Solomon, Chapter 4: The Drivers of Information Security Business.
Keywords
- Common Vulnerabilities and Exposures (CVE)
- Risk Management
- Risk Mitigation
- Security Countermeasures
- Window of Vulnerability (WoV)
Assignments and Study Materials
- Unit 2 Lecture Slides
- Lab 2.1: Performing a Vulnerability Assessment
- Project 2.2: Project Part 1 - Multi-Layered Security Plan
- (Project Part 2: Student SSCP® Domain Research Paper - Assigned)
- Assignment 2.3: Calculate the Window of Vulnerability
- Assignment 2.4: Microsoft Environment Analysis
Questions and Feedback
Use the form below to ask questions or provide feedback about the concepts covered during Unit 2's session of class: