Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

In the table below you will need to research and prioritise any system security threats, or vulnerabilities identified in the AMG Perth Branch IT Infrastructure:

In the table below you will need to research and prioritise any system security threats, or vulnerabilities identified in the AMG Perth Branch IT Infrastructure:

Rating Definition
Priority 1 This update resolves vulnerabilities or security threats that have a higher risk or has been targeted by hackers
Priority 2 This update resolves vulnerabilities in a product that has an elevated risk and is likely to be targeted by hackers.
Priority 3 This update resolves vulnerabilities in a product that has historically not been a target for attackers but could be.

Fill in the following table based on your findings

Identified area of the network or device. Security Threat or Vulnerability Priority

Task 2 - Make recommendations to management to address security deficiencies according to organisational asset security requirements

Referring to the project scenario and your findings in Task 2 make a detailed report with your recommendations to secure the AMG Perth Network & Data including the items below:

  • Physical Network Security

Physical security controls are designed to prevent unauthorized personnel from gaining physical access to network components such as routers, cabling cupboards and so on. Controlled access, such as locks, biometric authentication and other devices, is essential in any organization.

  • Technical Network Security

Technical security controls protect data that is stored on the network, or which is in transit across, into or out of the network. Protection is twofold; it needs to protect data and systems from unauthorized personnel, and it also needs to protect against malicious activities from employees.

  • Administrative Network Security

Administrative security controls consist of security policies and processes that control user behaviour, including how users are authenticated, their level of access and also how IT staff members implement changes to the infrastructure.

Attach a report or as a separate document. The report is to be formatted in a professional manner including an intro, headings and summary.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Computer Networks

Authors: Andrew S. Tanenbaum, David J. Wetherall

5th edition

132126958, 978-0132126953

More Books

Students also viewed these Computer Network questions

Question

L A -r- P[N]

Answered: 1 week ago