Computer Science Homework Help
University of Nebraska at Omaha Personal Technology Use Cyber Security Paper
assignment is to perform a cybersecurity risk assessment of yourself–of your personal exposure to technology (hint…not just devices). For this assignment, I recommend you use a risk framework, such as risk scenario as discussed in our readings. Another framework to use could be the NIST Cybersecurity Risk Assessment Process (Links to an external site.) (NIST 800-30r1).
Your paper should be 4-8 pages and use the formatting guidelines described in Module 1. Your assessment can include diagrams and or risk matrix charts to help explain the findings, but should not be considered part of the 4-5 pages. Please refer to the Personal Technology Risk Assessment Templet to structure your paper. Use this as an outline for your paper.
Your paper should include the following elements:
Part 1 (25 points)
- The first step is to establish what is in scope for the security assessment; an inventory of your personal technology footprint. What technology do you use in your life? Please do not include any personal or confidential information in this inventory
- Definition and documentation of your personal risk appetite
Part 2 (50 points)
- Identify threat sources that are relevant to your personal technology use
- Identify threat events that could be produced by those sources
- Identify vulnerabilities within your personal technology footprint that could be exploited by threat sources through specific threat events
- Determine the likelihood that the identified threat sources would cause specific threat events and the likelihood that the threat events would be successful
- Determine the adverse impacts to you resulting from the exploitation of vulnerabilities by threat sources (through specific threat events)
- Determine information security risks as a combination of likelihood of threat exploitation of vulnerabilities and the impact of such exploitation
Part 3 (25 points)
- Identification of at least three improvements you would recommend for your personal technology use based on the risk assessment you performed and why you chose these three improvements.