Reference no: EM133358359
The choose organization is Detroit Health Department Provides Notice of Data Security Incident
From the information that you gathered in the previous steps, develop a two-page summary of your organization's security weaknesses. Identify threats, risks, and vulnerabilities to achieve a holistic view of risk across the entity.
Consider areas that should be improved from a technology perspective, a people perspective, and a policy perspective. Also note potential risks associated with maintaining the current security posture.
Now that you have looked at security weaknesses, it's time to identify areas that should be improved or strengthened, including potential risks associated with maintaining the current security posture. Discuss how you would employ network analysis tools to identify software communications vulnerabilities. Make sure to include the following information:
Classify risks according to relevant criteria.
Explain system and application security threats and vulnerabilities.
Prioritize risks from internal and external sources.
Assess the cybersecurity threats faced by your entity.