SECURITY ASSESSMENT & TESTING|Legit essays

Posted: January 23rd, 2023

Business Case: Local airport

The parameters.

turnitin
We can write
your paper for you
100% original
24/7 service
50+ subjects

15,000 passengers a day

530 flights daily  

350 fulltime employees

There are three databases in the Airport’s data center.

1-Passenger database to record and authenticate each passenger in the airport

2-Employee database to record and authenticate each employee in the airport

3-Flight database to record each flight in the airport

Every day the following processes must be done:

Process 1:  For each passenger: a Boarding Pass will be calculated, prepared, and stored. The final version of the boarding pass will be printed on the printers at the airport

Process 2: For each aircraft; Flight logs along with the passenger checklist will be prepared and stored.

Process 3: One-week old Passenger and Flight data will be stored in long-term storage (archive)

Question 1 Identify cyber assets based on the NIST definition in the given Local airport business case. List the cyber assets.

Question 2 What are the steps that you would follow to fulfill the requirement of the NIST Risk Management Framework for the Airport? Write each step

Question 3 Do your search and find common cybersecurity threats in aviation.  And prepare your Risk Assessment Report (RAR) Based on the following threat sources

  • Adversarial
  • Structural
  • Environmental

Question 4 List the Risk Treatment Alternatives you would consider for each cybersecurity threat for the Airport.

SOLUTION

Security assessment and testing are methods used to evaluate the security of a system, network, or application. Security assessments are typically conducted by security professionals who use a variety of tools and techniques to identify vulnerabilities and assess the overall security posture of a system. Security testing, on the other hand, is the process of actively trying to exploit vulnerabilities in a system to verify that it can withstand attack. Common security testing methods include penetration testing, vulnerability scanning, and security audits. Together, security assessment and testing provide a comprehensive view of a system’s security and can help organizations identify and remediate vulnerabilities before they can be exploited by attackers.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00