Describe the areas of the organization that are at risk

Assignment Help Computer Engineering
Reference no: EM132576682

Assignment: A security vulnerability report identifies the areas of the organization that are at risk of losing data, outages, etc. Typically, organizations categorize the report to focus on specific areas and highlight the level of risk per area. Based on the vulnerability report, organizations are able to plan appropriately for budgeting and resource improvements.

Write a 2½- to 3 ½-page security vulnerability report in Microsoft Word based on the organization you chose in Week 1. An internal review of your organization was previously conducted and found the following vulnerabilities:

• A formal Password Policy has not been developed that meets your organization's regulatory requirements.

• The organization only uses single factor authentication using weak passwords.

• Vulnerability Severity: High

• Impact: Threats could easily guess weak passwords allowing unauthorized access.

• Software configuration management does not exist on your organization's production servers.

• There are different configurations on each server and no operating system patching schedule.

• Vulnerability Severity: Moderate

• Impact: With ad hoc configuration management, the organization could inadvertently or unintentionally make changes to the servers that could cause a self-imposed denial of service.

• An Incident Response Plan has not been developed.

• There is not a formal process for responding to a security incident.

• Vulnerability Severity: High

• Impact: In the event of a security incident, an ad hoc process could allow the security incident to get worse and spread throughout the network; the actual attack may not be recognized or handled in a timely manner giving the attacker more time to expand the attack.

Consider people, processes, and technology that can be exploited by the source of a threat.

Include recommended countermeasures to mitigate the impacts and risks of the vulnerabilities.

Format your citations according to APA guidelines.

Reference no: EM132576682

Questions Cloud

What amount should she deposit today to allow : Sophie set up a savings fund for her son's education so that she would be able to withdraw $1,775 at the beginning of every month
Compute the amount of phantom profit that would result : Compute the amount of phantom profit that would result if the company used FIFO rather than LIFO. The company uses the periodic method.
Diversity awareness in communications : Analyze the need for diversity awareness in communications. Describe the level of diversity awareness in your organization's climate.
How much is the estimated before-tax cash inflow to be : Payback Company is considering, In order to realize the IRR of 15 percent, how much is the estimated before-tax cash inflow to be provided by the machine?
Describe the areas of the organization that are at risk : A security vulnerability report identifies the areas of the organization that are at risk of losing data, outages, etc. Typically, organizations categorize.
What is the 5-year individual customer clv : Each column shows the values for a typical customer in each class (constant over the lifetime of the customer). The annual
What would be the incremental investment in receivables : Assume a tax rate of 40% and 360 days per year. What would be the incremental investment in receivables if the change were made?
Prepare software requirements specification : Prepare Software Requirements Specification for FACEBOOK FOR ANDROID - describe the external behavior of the application or subsystem identified.
Lead information and lag information : What do we mean by lead information and lag information? how a business might improve the performance of one of its existing business processes

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd