Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Please SWOT analysis this assignment Discuss the vulnerabilities, and consolidate the list of vulnerabilities and assets. Vulnerability is a weakness in a system which can

  • Please SWOT analysis this assignment
  • Discuss the vulnerabilities, and consolidate the list of vulnerabilities and assets.

Vulnerability is a weakness in a system which can be threatened by attacker. These weaknesses are mainly assets which are exploited or broken in order to violate security of the system.

Some of the vulnerabilities and assets in network are discussed below:

Digital data is very big asset of any organization

  • It can be threatened by use of infected USB drives, laptops, and other network devices as they make data vulnerable to attacks by virus, worms, Trojan horse due to vulnerabilities of not installing antivirus software, or not keeping system properly updated.
  • Unauthorized access is another threat to digital data which is possible due to vulnerabilities of maintaining proper access control or sharing userId and passwords.
  • Email, smartphones, uncontrolled access to network are the vulnerabilities which causes threat to data

Assets: Administrator

  • Errors by the person in managing network due to vulnerabilities of unavailability or low skill of personal.
  • Intentional compromises is also one of the vulnerabilities.

Asset- Network connectivity

  • OLD Wireless access point or network devices have immediate effect on network connectivity speed.

Rank the top 6 most vulnerable assets.

> Data

> Administrator

>Network connectivity

> Employees

> Network

> Hardware

Review the 4 controls/policies for each group member from the Unit 4 Discussion Board assignment.

Four policies which can help in controlling network vulnerabilities are

  • Access control : Organization must have different access control to different user group. E.g. Data which is needed for HR department must be accessed by HR employees and must not be available to other department.
  • Security policy: Policy should be made to ensure security such as password change policy which ensures password is changed every 15 days or so, software updates etc.
  • Incident response policy : Response plan must be planned and proper policy must be stated who have to informed about incident and what response is needed in different conditions.
  • Remote access: More and more people are opting for remote working, this calls for remote access policy, which states how system is to be connected through company private and how through public network/

Pick 4, one from each of the areas (Entity, Network, Operating Systems, and Web/Databases). Decide as a group why each was chosen.

Entity access policy as they will be the one who access the network

Network: Remote access and Access policy

Operating system : Security policy

Web/databases : Remote access

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Fundamentals Of Database Management Systems

Authors: Mark L. Gillenson

2nd Edition

0470624701, 978-0470624708

More Books

Students also viewed these Databases questions

Question

She did not remember him giving the instruction.

Answered: 1 week ago