Question
Please SWOT analysis this assignment Discuss the vulnerabilities, and consolidate the list of vulnerabilities and assets. Vulnerability is a weakness in a system which can
- Please SWOT analysis this assignment
- Discuss the vulnerabilities, and consolidate the list of vulnerabilities and assets.
Vulnerability is a weakness in a system which can be threatened by attacker. These weaknesses are mainly assets which are exploited or broken in order to violate security of the system.
Some of the vulnerabilities and assets in network are discussed below:
Digital data is very big asset of any organization
- It can be threatened by use of infected USB drives, laptops, and other network devices as they make data vulnerable to attacks by virus, worms, Trojan horse due to vulnerabilities of not installing antivirus software, or not keeping system properly updated.
- Unauthorized access is another threat to digital data which is possible due to vulnerabilities of maintaining proper access control or sharing userId and passwords.
- Email, smartphones, uncontrolled access to network are the vulnerabilities which causes threat to data
Assets: Administrator
- Errors by the person in managing network due to vulnerabilities of unavailability or low skill of personal.
- Intentional compromises is also one of the vulnerabilities.
Asset- Network connectivity
- OLD Wireless access point or network devices have immediate effect on network connectivity speed.
Rank the top 6 most vulnerable assets.
> Data
> Administrator
>Network connectivity
> Employees
> Network
> Hardware
Review the 4 controls/policies for each group member from the Unit 4 Discussion Board assignment.
Four policies which can help in controlling network vulnerabilities are
- Access control : Organization must have different access control to different user group. E.g. Data which is needed for HR department must be accessed by HR employees and must not be available to other department.
- Security policy: Policy should be made to ensure security such as password change policy which ensures password is changed every 15 days or so, software updates etc.
- Incident response policy : Response plan must be planned and proper policy must be stated who have to informed about incident and what response is needed in different conditions.
- Remote access: More and more people are opting for remote working, this calls for remote access policy, which states how system is to be connected through company private and how through public network/
Pick 4, one from each of the areas (Entity, Network, Operating Systems, and Web/Databases). Decide as a group why each was chosen.
Entity access policy as they will be the one who access the network
Network: Remote access and Access policy
Operating system : Security policy
Web/databases : Remote access
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started