Question
Review the following list of risks, threats, and vulnerabilities at the fictional Healthwise Health Care Company. Unauthorized access from public Internet Hacker penetrates IT infrastructure
Review the following list of risks, threats, and vulnerabilities at the fictional Healthwise Health Care Company.
Unauthorized access from public Internet
Hacker penetrates IT infrastructure
Communication circuit outages
Workstation operating system (OS) has a known software vulnerability
Unauthorized access to organization-owned data
Denial of service attack on organizations e-mail
Remote communications from home office
Workstation browser has software vulnerability
Weak ingress/egress traffic-filtering degrades performance
Wireless Local Area Network (WLAN) access points are needed for Local Area Network (LAN) connectivity within a warehouse
User destroys data in application, deletes all files, and gains access to internal network
Fire destroys primary data center
Intraoffice employee romance gone bad
Loss of production data
Need to prevent rogue users from unauthorized WLAN access
LAN server OS has a known software vulnerability
User downloads an unknown e-mail attachment
Service provider has a major network outage
User inserts a USB hard drive with personal photos, music, and videos on organization-owned computers
Virtual Private Network (VPN) tunneling between the remote computer and ingress/egress router
For each risk, threat, or vulnerability in the list above, select an appropriate security policy that might help mitigate it. You can select one of the SANS policies or choose one from the following list.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started