Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Risk / Threat Solution / Preventative Action 1 . Security policy violation 2 . Compromised confidentiality of data transmissions via WLAN 3 . Unauthorized network
RiskThreat Solution
Preventative Action
Security policy violation
Compromised confidentiality of data transmissions via WLAN
Unauthorized network probing and port scanning
IP router, firewall, and network appliance operating system software vulnerability
Private data or confidential data compromised remotely
A mobile workers laptop may be stolen
Infection of a users workstation or laptop computer by viruses, malicious code, or malware
Insecure cloud computing virtual environments by default
Downtime of IT systems for an extended period after a disaster
Attacks on the organization or acts of sabotage by disgruntled employees
Vulnerable to DoS, DDoS, TCP SYN flooding, and IP spoofing attacks
Employees and users want to use their own smartphone or tablets
Solutions or Preventative Actions
A Implement encryption between workstation and WAP to maintain confidentiality.
B Encrypt the data on the hard drive if the user has access to private or confidential data. Apply realtime lockout rules when told of a lost or stolen laptop by a user.
C Place employee on probation, review acceptable use policy AUP and employee manual, and discuss status during performance reviews.
D Apply filters on exterior Internet Protocol IP stateful firewalls and IP router wide area network WAN interfaces.
E Develop a Bring Your Own Device BYOD policy and procedure. BYOD policies and procedures typically permit the organization to datawipe the users smartphone or mobile device if it is lost or the employee is terminated.
F Implement virtual firewalls and server segmentation on separate virtual LANs VLANs A virtual firewall is a softwarebased firewall used in virtual environments.
G Define a strict zeroday vulnerability window definition. Update devices with security fixes and software patches right away.
H Disable ping, probing, and port scanning on all exterior IP devices within the LANtoWAN Domain. Ping uses the Internet Control Message Protocol ICMP echorequest and echoreply protocol. Disallow IP port numbers used for probing and scanning and monitor with IDSIPS
I. Track and monitor abnormal employee behavior, erratic job performance, and use of IT infrastructure during offhours. Begin IT access control lockout procedures based on AUP monitoring and compliance.
J Develop a disaster recovery plan DRP specific to the recovery of missioncritical applications and data to maintain operations.
K Encrypt all confidential data within the database or hard drive.
L Use workstation antivirus and malicious code policies, standards, procedures, and guidelines. Enable an automated antivirus protection solution that scans and updates individual workstations with proper protection.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started