Question: Tasks: Make a report containing following information: Task 1: Discuss following types of threats in the system a. Adware b. Virus c. Worms d. Spyware
Tasks:
Make a report containing following information:
Task 1: Discuss following types of threats in the system
a. Adware
b. Virus
c. Worms
d. Spyware
e. Trojan
f. Man in the Middle
g. DOS
h. Spoofing
i. Spam
j. Phishing
Task 2: Discuss following risk mitigation strategies
a. Security Controls
b. Change Management
c. Incident Management
d. User rights and permission reviews
e. Perform routine audits
Task 3: Discuss following security controls in performing account management
a. Account policy enforcement
b. Group based privileges
c. User assigned privileges
Task 4: Explain following security controls
a. Wireless Network Security
b. Cryptographic Tools
c. Authentication Services
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
