Web and Cloud Threats

31 Mar

Use the iNTegrity file integrity checking software

– Description in Appendix E

• Provide a threat model for the proposed system

• Identify AT LEAST three specific threats

– NOT threat types!

– One for data flow, one for data store, one for a process

• Recommend at least two remediations per threat

• Each group will write a paper

– Describe each threat

– At least two remediation recommendations for each threat


Papers should follow this general outline:

– Introduction

– System description (elaborate on Figure E-6) and

BRIEFLY describe iNTegrity

– Identified Threats (at least three)

• Justification and explanation

• References

• Impact if not addressed

– Remediation recommendations

• At least two remediations per threat

– Conclusions


Must be in APA Style – Recommend Research

APA Style Before Residency Weekend

• Research Paper Must Have at Least 5 Works

Cited of Which 2 Must be Peer Reviewed


• Must be at Least 5 Double-Spaced Pages

• Minimum 1,250 words


Powerpoint presentation with 10 slides and same content as paper

Leave a comment

Posted by on March 31, 2018 in academic writing, Academic Writing



Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: