Description
Take a look at the attachment. This gives you a visual of Marge's retail store's current IT infrastructure. Marge is looking to enhance her online sales but before she does she has called you to conduct a thorough threat assessment and recommend threat mitigations and controls prior to moving forward with the new project she is calling Using the Internet to Increase Sales.
Write a 3 to 5 page paper with proper APA formatting using the threat modeling techniques we have gone over thus far to uncover any threats that jump out from the attachment. Use critical thinking, look for information flows, exposures, vulnerabilities, and so on. Once you have identified threats suggest mitigations that would reduce the risk of those threats. Also, note that Marge is using a public IP space of 200.200.200.0/24 for the entire network infrastructure i.e. one Local Area Network.
You should at a minimum uncover 5 potential threats within this architecture.
Unformatted Attachment Preview
Purchase answer to see full attachment
Explanation & Answer
Hi, kindly find attached
Running head: MERGE RETAIL STORE
1
Marge Retail Store
Student's Name
Institution
Date
MERGE RETAIL STORE
2
Abstract
The internet comprises information, both personal and sensitive business information.
Regularly there are reported cases of content being stolen and released to public websites by
hackers. The posts place the organization and the users at risk. The credential may contain links
to sensitive company's credentials. In security management, vulnerabilities assessment is the
most crucial step in accessing your network. The process involves using the utilities and legacy
infrastructure model to scan for your network vulnerabilities. The essay discusses the model and
the possible threats that the design subjects the model too. If one wants to determine how
vulnerable the organization's network falls subject to security breaches, he /she has to use the
methods used by possible invaders. Threat model often involves identifying, communicate and
understanding the threats and mitigations within the model. Threat modeling can be applied to a
wide range. Which includes; software, networks, application systems, business processes, things
in the internet of things and distributed systems, etc. threat modeling can be introduced in an
organization at any stage of the company's development stage. Preferably, it is best to imply at
early stages, so that the findings can inform necessary changes in the designs.
MERGE RETAIL STORE
3
The database model subjects the merge retail stores to several kinds of a...