A survey of your firms information technology infrastructure has produced the following security analysis statistics: High risk

Question:

A survey of your firm’s information technology infrastructure has produced the following security analysis statistics:

High risk vulnerabilities include non-authorized users accessing applications, guessable passwords, user names matching the password, active user accounts with missing passwords, and the existence of unauthorized programs in application systems.
Medium risk vulnerabilities include the ability of users to shut down the system without being logged on, passwords and screen saver settings that were not established for PCs, and outdated versions of software still being stored on hard drives.
Low risk vulnerabilities include the inability of users to change their passwords, user passwords that have not been changed periodically, and passwords that were smaller than the minimum size specified by the company.

Fantastic news! We've Found the answer you've been seeking!

Step by Step Answer:

Related Book For  book-img-for-question

Management Information Systems

ISBN: 9780132142564

12th Edition

Authors: Ken Laudon, Kenneth Laudon, Jane Laudon

Question Posted: