Cumberlands Security Concerns and Mitigation Strategies Paper
Assignment Requirements
You are provided a handout to do this assignment.
Tasks
Identify a networked technology you use at home, at work, or as a personal convenience. Research and identify three potential threats to endpoint security of the device, and detail a mitigation mechanism for each threat. Also explain why your mitigation strategies would work. Submit the report to your instructor.
Required Resources
- Textbook
- Internet
- Handouts:
- Security Concerns and Mitigation Strategies
- Hosts
- RS Assignment 3 Security Concerns and Mitigation Strategies Template.docx (YOU MUST USE THIS TEMPLATE TO GET FULL CREDIT)
Submission Requirements
- Format: Microsoft Word
- Font: Arial, Size 12, Double-Space
- Citation Style: APA
- Length: 2–2 pages
- Spelling & Grammar count
Self-Assessment Checklist
- I identified at least one personally significant networked technology.
- I researched and identified three appropriate threats associated with the technology.
- I provided a mitigation strategy for each identified threat.
- I explained why my mitigation strategies would work.