Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

the vulnerabilities are: 1- Lack of Proper Control Access 2- Lack of Employee training and awareness 3- Dependence of third-party app and software 4- lack

the vulnerabilities are:

1-Lack of Proper Control Access

2-Lack of Employee training and awareness

3-Dependence of third-party app and software

4-lack of vulnerability scanning for employee devices

5-Use of remote desktop protocol for network

6-Cloud service provider

the threats are :

1-Employee Error

2-DOs Attacks

3-Malware Attacks

4-Phising Attacks

5-Loss Of Personal Data or IP

*I need to justify the likelihood between them*

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database And Transaction Processing

Authors: Philip M. Lewis, Arthur Bernstein, Michael Kifer

1st Edition

0201708728, 978-0201708721

More Books

Students also viewed these Databases questions