Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Review the following list of risks, threats, and vulnerabilities at the fictional Healthwise Health Care Company. Unauthorized access from public Internet Hacker penetrates IT infrastructure

Review the following list of risks, threats, and vulnerabilities at the fictional Healthwise Health Care Company.

Unauthorized access from public Internet

Hacker penetrates IT infrastructure

Communication circuit outages

Workstation operating system (OS) has a known software vulnerability

Unauthorized access to organization-owned data

Denial of service attack on organizations e-mail

Remote communications from home office

Workstation browser has software vulnerability

Weak ingress/egress traffic-filtering degrades performance

Wireless Local Area Network (WLAN) access points are needed for Local Area Network (LAN) connectivity within a warehouse

User destroys data in application, deletes all files, and gains access to internal network

Fire destroys primary data center

Intraoffice employee romance gone bad

Loss of production data

Need to prevent rogue users from unauthorized WLAN access

LAN server OS has a known software vulnerability

User downloads an unknown e-mail attachment

Service provider has a major network outage

User inserts a USB hard drive with personal photos, music, and videos on organization-owned computers

Virtual Private Network (VPN) tunneling between the remote computer and ingress/egress router

For each risk, threat, or vulnerability in the list above, select an appropriate security policy that might help mitigate it. You can select one of the SANS policies or choose one from the following list.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions