A Cyber Security Threat Analyst conducts analysis, digital forensics, and targeting to identify, monitor, assess, and counter cyber-attack threats against information systems, critical infrastructure, and cyber-related interests. Take on the role of a Cyber Security Threat Analyst for the approved organization you chose. Research the following information about the organization you chose and complete the Threats, Attacks, and Vulnerability

A Cyber Security Threat Analyst conducts analysis, digital forensics, and targeting to identify, monitor, assess, and counter cyber-attack threats against information systems, critical infrastructure, and cyber-related interests. Take on the role of a Cyber Security Threat Analyst for the approved organization you chose. Research the following information about the organization you chose and complete the Threats, Attacks, and Vulnerability.

Threats, Attacks, and Vulnerability Assessment Template

Instructions: Replace the information in brackets [ ] with information relevant to your project.

A Cyber Security Threat Analyst conducts analysis, digital forensics, and targeting to identify, monitor, assess, and counter cyber-attack threats against information systems, critical infrastructure, and cyber-related interests. Take on the role of a Cyber Security Threat Analyst for the approved organization you chose. Research the following information about the organization you chose and complete the Threats, Attacks, and Vulnerability Assessment template.

[Organization Name/Description]

Assessment Scope

What are the tangible assets included? (Must include virtualization, cloud, database, network, mobile, information systems.) Identify all information systems, critical infrastructure, and cyber-related interests and combinations that will be assessed. Also, describe information systems, critical infrastructure, and cyber-related interests which will not be assessed and explain why.

[Response]

System Model

A diagram and descriptions of each asset included in the assessment scope.

[Diagram here or attached]

[Response]

Existing Countermeasures

Describe existing countermeasure already in place.

[Response]

Threat Agents and Possible Attacks

Define 12 to 15 threat agents and possible attacks.

[Response]

Exploitable Vulnerabilities

Identify 7 to 9 exploitable vulnerabilities.

[Response]

Threat History/Business Impact

Threat History Events Duration Business Impact Threat Resolution
[Response] [Response] [Response] [Response]
[Response] [Response] [Response] [Response]
[Response] [Response] [Response] [Response]
[Response] [Response] [Response] [Response]

 

Risks and Contingencies Matrix

Risk Probability Priority Owner Countermeasures/Contingencies/Mitigation Approach
[Response] [Response] [Response] [Response] [Response]
[Response] [Response] [Response] [Response] [Response]
[Response] [Response] [Response] [Response] [Response]
[Response] [Response] [Response] [Response] [Response]

 

A Cyber Security Threat Analyst conducts analysis, digital forensics, and targeting to identify, monitor, assess, and counter cyber-attack threats against information systems, critical infrastructure, and cyber-related interests. Take on the role of a Cyber Security Threat Analyst for the approved organization you chose. Research the following information about the organization you chose and complete the Threats, Attacks, and Vulnerability

Posted in Uncategorized

Leave a Reply