Threats Attacks and Vulnerability Assessment Template



-236220-838835Threats, Attacks, and Vulnerability Assessment TemplateInstructions: Replace the information in brackets [ ] with information relevant to your project.A Cyber Security Threat Analyst conducts analysis, digital forensics, and targeting to identify, monitor, assess, and counter cyber-attack threats against information systems, critical infrastructure, and cyber-related interests. Take on the role of a Cyber Security Threat Analyst for the approved organization you chose. Research the following information about the organization you chose and complete the Threats, Attacks, and Vulnerability Assessment template.[Organization Name/Description]Assessment ScopeWhat are the tangible assets included? (Must include virtualization, cloud, database, network, mobile, information systems.) Identify all information systems, critical infrastructure, and cyber-related interests and combinations that will be assessed. Also, describe information systems, critical infrastructure, and cyber-related interests which will not be assessed and explain why.[Response]System ModelA diagram and descriptions of each asset included in the assessment scope.[Diagram here or attached][Response]Existing CountermeasuresDescribe existing countermeasure already in place.[Response]Threat Agents and Possible AttacksDefine 12 to 15 threat agents and possible attacks.[Response]Exploitable VulnerabilitiesIdentify 7 to 9 exploitable vulnerabilities.[Response]Threat History/Business ImpactThreat History EventsDurationBusiness ImpactThreat Resolution[Response][Response][Response][Response][Response][Response][Response][Response][Response][Response][Response][Response][Response][Response][Response][Response]Risks and Contingencies MatrixRiskProbabilityPriorityOwnerCountermeasures/Contingencies/Mitigation Approach[Response][Response][Response][Response][Response][Response][Response][Response][Response][Response][Response][Response][Response][Response][Response][Response][Response][Response][Response][Response] ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download