Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Review current system security against organisational asset security requirements to identify security threats and vulnerabilities. Analyse network, software, hardware and system security threats and vulnerabilities

Review current system security against organisational asset security requirements to identify security threats and vulnerabilities. Analyse network, software, hardware and system security threats and vulnerabilities to prioritise deficiencies to be addressed. 

AMG Perth current Server, Client & Network information:

  • Windows Server
    • CPU: Intel Xeon E3-1290
    • RAM: 8GB
    • HDD: Single 1TB SATA drive for OS and Data Storage
    • OS: Windows Server Standard 2012
    • DC and AD Roles configured
    • Windows Firewall is on. No Antivirus/Malware installed.
  • Windows Client PC's
    • CPU: Intel Core i3-560
    • RAM: 2GB
    • HDD: 250GB SATA drive for OS and Data Storage
    • OS: Windows 7 Professional
    • Windows Firewall is on. No Antivirus/Malware installed.
  • Switches & Routers
    • 1 x unmanaged 12 port TP-link Switch
    • 1 x Telstra NBN Router with default configuration
  • Security
    • No ICT Security Policies and Procedures
    • Currently no security devices installed or configured.
    • All equipment stored in an unlocked comms rack behind reception desk

In the table below you will need to research and prioritise any system security threats, or vulnerabilities identified in the AMG Perth Branch IT Infrastructure:

Rating Definition
Priority 1 This update resolves vulnerabilities or security threats that have a higher risk or has been targeted by hackers
Priority 2 This update resolves vulnerabilities in a product that has an elevated risk and is likely to be targeted by hackers.
Priority 3 This update resolves vulnerabilities in a product that has historically not been a target for attackers but could be.

Fill in the following table based on your findings

Identified area of the network or device. Security Threat or Vulnerability Priority
























Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Accounting Information Systems

Authors: George H. Bodnar, William S. Hopwood

11th Edition

0132871939, 978-0132871938

More Books

Students also viewed these Computer Network questions

Question

Was the Hawthorne effect operating?

Answered: 1 week ago

Question

Designate the steps that should be followed in a fraud engagement.

Answered: 1 week ago

Question

What is aggregate operations planning? What is its purpose?

Answered: 1 week ago