Question: Please SWOT analysis this assignment Discuss the vulnerabilities, and consolidate the list of vulnerabilities and assets. Vulnerability is a weakness in a system which can

  • Please SWOT analysis this assignment
  • Discuss the vulnerabilities, and consolidate the list of vulnerabilities and assets.

Vulnerability is a weakness in a system which can be threatened by attacker. These weaknesses are mainly assets which are exploited or broken in order to violate security of the system.

Some of the vulnerabilities and assets in network are discussed below:

Digital data is very big asset of any organization

  • It can be threatened by use of infected USB drives, laptops, and other network devices as they make data vulnerable to attacks by virus, worms, Trojan horse due to vulnerabilities of not installing antivirus software, or not keeping system properly updated.
  • Unauthorized access is another threat to digital data which is possible due to vulnerabilities of maintaining proper access control or sharing userId and passwords.
  • Email, smartphones, uncontrolled access to network are the vulnerabilities which causes threat to data

Assets: Administrator

  • Errors by the person in managing network due to vulnerabilities of unavailability or low skill of personal.
  • Intentional compromises is also one of the vulnerabilities.

Asset- Network connectivity

  • OLD Wireless access point or network devices have immediate effect on network connectivity speed.

Rank the top 6 most vulnerable assets.

> Data

> Administrator

>Network connectivity

> Employees

> Network

> Hardware

Review the 4 controls/policies for each group member from the Unit 4 Discussion Board assignment.

Four policies which can help in controlling network vulnerabilities are

  • Access control : Organization must have different access control to different user group. E.g. Data which is needed for HR department must be accessed by HR employees and must not be available to other department.
  • Security policy: Policy should be made to ensure security such as password change policy which ensures password is changed every 15 days or so, software updates etc.
  • Incident response policy : Response plan must be planned and proper policy must be stated who have to informed about incident and what response is needed in different conditions.
  • Remote access: More and more people are opting for remote working, this calls for remote access policy, which states how system is to be connected through company private and how through public network/

Pick 4, one from each of the areas (Entity, Network, Operating Systems, and Web/Databases). Decide as a group why each was chosen.

Entity access policy as they will be the one who access the network

Network: Remote access and Access policy

Operating system : Security policy

Web/databases : Remote access

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!