Answered step by step
Verified Expert Solution
Question
1 Approved Answer
the vulnerabilities are: 1- Lack of Proper Control Access 2- Lack of Employee training and awareness 3- Dependence of third-party app and software 4- lack
the vulnerabilities are:
1-Lack of Proper Control Access
2-Lack of Employee training and awareness
3-Dependence of third-party app and software
4-lack of vulnerability scanning for employee devices
5-Use of remote desktop protocol for network
6-Cloud service provider
the threats are :
1-Employee Error
2-DOs Attacks
3-Malware Attacks
4-Phising Attacks
5-Loss Of Personal Data or IP
*I need to justify the likelihood between them*
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started