Describe the areas of the organization that are at risk

Assignment Help Computer Engineering
Reference no: EM132576682

Assignment: A security vulnerability report identifies the areas of the organization that are at risk of losing data, outages, etc. Typically, organizations categorize the report to focus on specific areas and highlight the level of risk per area. Based on the vulnerability report, organizations are able to plan appropriately for budgeting and resource improvements.

Write a 2½- to 3 ½-page security vulnerability report in Microsoft Word based on the organization you chose in Week 1. An internal review of your organization was previously conducted and found the following vulnerabilities:

• A formal Password Policy has not been developed that meets your organization's regulatory requirements.

• The organization only uses single factor authentication using weak passwords.

• Vulnerability Severity: High

• Impact: Threats could easily guess weak passwords allowing unauthorized access.

• Software configuration management does not exist on your organization's production servers.

• There are different configurations on each server and no operating system patching schedule.

• Vulnerability Severity: Moderate

• Impact: With ad hoc configuration management, the organization could inadvertently or unintentionally make changes to the servers that could cause a self-imposed denial of service.

• An Incident Response Plan has not been developed.

• There is not a formal process for responding to a security incident.

• Vulnerability Severity: High

• Impact: In the event of a security incident, an ad hoc process could allow the security incident to get worse and spread throughout the network; the actual attack may not be recognized or handled in a timely manner giving the attacker more time to expand the attack.

Consider people, processes, and technology that can be exploited by the source of a threat.

Include recommended countermeasures to mitigate the impacts and risks of the vulnerabilities.

Format your citations according to APA guidelines.

Reference no: EM132576682

Questions Cloud

What amount should she deposit today to allow : Sophie set up a savings fund for her son's education so that she would be able to withdraw $1,775 at the beginning of every month
Compute the amount of phantom profit that would result : Compute the amount of phantom profit that would result if the company used FIFO rather than LIFO. The company uses the periodic method.
Diversity awareness in communications : Analyze the need for diversity awareness in communications. Describe the level of diversity awareness in your organization's climate.
How much is the estimated before-tax cash inflow to be : Payback Company is considering, In order to realize the IRR of 15 percent, how much is the estimated before-tax cash inflow to be provided by the machine?
Describe the areas of the organization that are at risk : A security vulnerability report identifies the areas of the organization that are at risk of losing data, outages, etc. Typically, organizations categorize.
What is the 5-year individual customer clv : Each column shows the values for a typical customer in each class (constant over the lifetime of the customer). The annual
What would be the incremental investment in receivables : Assume a tax rate of 40% and 360 days per year. What would be the incremental investment in receivables if the change were made?
Prepare software requirements specification : Prepare Software Requirements Specification for FACEBOOK FOR ANDROID - describe the external behavior of the application or subsystem identified.
Lead information and lag information : What do we mean by lead information and lag information? how a business might improve the performance of one of its existing business processes

Reviews

Write a Review

Computer Engineering Questions & Answers

  Design two forms for a new software application

Design two forms for a new software application or business web app that will collect data from its user. [Note, these are electronic user interfaces.

  Define contrasting two major enterprise resource planning

recognize two major segments ERP systems. define contrasting two major Enterprise Resource Planning.

  What are the differences between a client and a server

What are the differences between a client and a server? What is function of each layer in a three-layer application? Why might more than three layers be used?

  What is the average number of machine cycles

What is the average number of machine cycles per instruction for this microprocessor - What is the clock rate (machine cycles per second) required for this microprocessor to be a "1 MIPS" processor?

  What concerns should be understood about data communications

What concerns should be understood about data communications being sent over wireless networks? Discuss the pros and cons of one method of transmission.

  Discuss the abc password management system is enforcing

Briefly describe what policy or policies the ABC password management system is enforcing

  How can you make two rectangles move in parallel in scene

How can you make two rectangles move in parallel in the scene? What would happen if you omitted the call to repaint in the move Rectangle By method?

  How many secret keys are needed if everyone trusts president

How many secret keys are needed if everyone trusts the president of the club? If a member needs to send a message to another member.

  What security controls can help protect user information

Discuss how an IPS/IDS can protect user information on a Windows system or any computing device that is connect to a network. What other security controls can.

  Construct an e-r diagram for the registrars office

Construct an E-R diagram for the registrar's office. Document all assumptions that you make about the mapping constraints.

  Create a smart device currency converter application

Create a smart device currency converter application. Select two markets, such as U.S. dollar and the Euro.

  Prepare a windows application

A national Digital service provider would like you to prepare a Windows application that will display the global growth of smart phones.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd