Question: In the table below you will need to research and prioritise any system security threats, or vulnerabilities identified in the AMG Perth Branch IT Infrastructure:

In the table below you will need to research and prioritise any system security threats, or vulnerabilities identified in the AMG Perth Branch IT Infrastructure:

Rating Definition
Priority 1 This update resolves vulnerabilities or security threats that have a higher risk or has been targeted by hackers
Priority 2 This update resolves vulnerabilities in a product that has an elevated risk and is likely to be targeted by hackers.
Priority 3 This update resolves vulnerabilities in a product that has historically not been a target for attackers but could be.

Fill in the following table based on your findings

Identified area of the network or device. Security Threat or Vulnerability Priority

Task 2 - Make recommendations to management to address security deficiencies according to organisational asset security requirements

Referring to the project scenario and your findings in Task 2 make a detailed report with your recommendations to secure the AMG Perth Network & Data including the items below:

  • Physical Network Security

Physical security controls are designed to prevent unauthorized personnel from gaining physical access to network components such as routers, cabling cupboards and so on. Controlled access, such as locks, biometric authentication and other devices, is essential in any organization.

  • Technical Network Security

Technical security controls protect data that is stored on the network, or which is in transit across, into or out of the network. Protection is twofold; it needs to protect data and systems from unauthorized personnel, and it also needs to protect against malicious activities from employees.

  • Administrative Network Security

Administrative security controls consist of security policies and processes that control user behaviour, including how users are authenticated, their level of access and also how IT staff members implement changes to the infrastructure.

Attach a report or as a separate document. The report is to be formatted in a professional manner including an intro, headings and summary.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Computer Network Questions!