Cloud Security Threats and Impact to the Business 4. Describe and define the following security threats with at least a paragraph each.
Also, describe what makes each vulnerability a threat and impact to the business.
- Denial of Service (DOS) and Distributed Denial of Service (DDOS) attacks
- Worms, virus, Trojan horses, and other malware.
- Man-in-the-middle (MITM) attacks
- Rootkit injections
- Misconfiguration of remote mobile devices
- Document how five (5) or more components and measures in the network architecture, as well as host-based measures, address the security threats from the previous step. The components could be a combination of software or hardware in nature – such as firewalls,
CSCI 601 IDS/IPS, routers, switches, anti-virus/malware software, full-disk encryption (FDE) and encryption in transit, remote device management software, etc.
- Describe in three (3) or more paragraphs the specific security threats regarding the specialty topic you chose.
- Describe in three (3) or more paragraphs the security controls (and their rationale for inclusion) that you will implement to mitigate against the security threats of the chosen specialty.
- Beyond the network design, what additional procedural/governance measures do you recommend to address security concerns (e.g., training, procedures, policies)? Describe in two (2) or more paragraphs at least one measure.
- Describe in one or more paragraphs how biblical principles come to bear with your proposed design and approach. Include specific scriptural references.
Outputs:
Write a project report in a research-based paper in current APA format that includes all the instructions described above. It should be ten (10) or more double-spaced pages inclusive of the content, a title page, as well as a reference page with at least 10 references in addition to the course textbook and the Bible.