Review current system security against organisational asset security requirements to identify security threats and vulnerabilities. Analyse network,
Fantastic news! We've Found the answer you've been seeking!
Question:
Review current system security against organisational asset security requirements to identify security threats and vulnerabilities. Analyse network, software, hardware and system security threats and vulnerabilities to prioritise deficiencies to be addressed.
AMG Perth current Server, Client & Network information:
- Windows Server
- CPU: Intel Xeon E3-1290
- RAM: 8GB
- HDD: Single 1TB SATA drive for OS and Data Storage
- OS: Windows Server Standard 2012
- DC and AD Roles configured
- Windows Firewall is on. No Antivirus/Malware installed.
- Windows Client PC's
- CPU: Intel Core i3-560
- RAM: 2GB
- HDD: 250GB SATA drive for OS and Data Storage
- OS: Windows 7 Professional
- Windows Firewall is on. No Antivirus/Malware installed.
- Switches & Routers
- 1 x unmanaged 12 port TP-link Switch
- 1 x Telstra NBN Router with default configuration
- Security
- No ICT Security Policies and Procedures
- Currently no security devices installed or configured.
- All equipment stored in an unlocked comms rack behind reception desk
In the table below you will need to research and prioritise any system security threats, or vulnerabilities identified in the AMG Perth Branch IT Infrastructure:
Rating | Definition |
Priority 1 | This update resolves vulnerabilities or security threats that have a higher risk or has been targeted by hackers |
Priority 2 | This update resolves vulnerabilities in a product that has an elevated risk and is likely to be targeted by hackers. |
Priority 3 | This update resolves vulnerabilities in a product that has historically not been a target for attackers but could be. |
Fill in the following table based on your findings
Identified area of the network or device. | Security Threat or Vulnerability | Priority |
Related Book For
Accounting Information Systems
ISBN: 9780132871938
11th Edition
Authors: George H. Bodnar, William S. Hopwood
Posted Date: