Suggest mitigation strategies for vulnerabilities identified

Assignment Help Computer Network Security
Reference no: EM13190560

Security risk assessment is an invaluable tool in an IT professional's quest to protect a company's information assets. IT projects that do not go through a security risk assessment process have a greater potential of exposing a company's information assets to corruption and loss.
Imagine that you are a security professional of a large company that has recently standardized its security risk-assessment process. Since the project members work from different offices and remote locations, they often have to transmit company confidential information to team members. The company uses cloud services for business applications. It is your responsibility to:

  • Uncover security administrative, technical, and physical vulnerabilities that exist within a new project.

  • Suggest possible mitigation strategies for the vulnerabilities identified.

  • Clearly articulate any vulnerability that is not mitigated to those with the authority to accept them.

    Risk Management varies in each instance and event. Selecting the various options from home or work may help make or break your network. 
    Write a four to five (4-5) page paper in which you:

  • Describe the objectives and major elements of your risk management plan.

  • Identify the top five (5) risks involved within your solution. Prioritize the risks and provide your rationale.

  • Suggest strategies to prevent and mitigate the risks identified in criterion two (2).

  • Identify physical security methods and the role they play in a network security plan. Compare and contrast the advantages and disadvantages of the physical security methods you identified.

Reference no: EM13190560

Questions Cloud

Find the length of the rectangle : A wire 76 in. long is bent to form a rectangle. If the width of the rectangle will be 16 in. Find the length of the rectangle.
How to resolve the conflict between the boy and his parents : How to resolve the conflict between the boy and his parents. A couple of things to remember are that we cannot "give" a solution to the clients - we have to make it come from them. This is where the Socratic questions come in handy. Secondly, we have..
State what is the new pressure of the gas in atmospheres : a temperature of 37 degrees Celcius were heated to a temperature of 250 degrees Celcius. If the volume does not change, what is the new pressure of the gas in atmospheres?
Determine an equation for the right bisector of the line : Determine an equation for the right bisector of the line segment with endpoints P(-5,-2) and Q(3,6)
Suggest mitigation strategies for vulnerabilities identified : Risk Management varies in each instance and event. Selecting the various options from home or work may help make or break your network.
Define a hypothetical atom has four allowed energy levels : A hypothetical atom has four allowed energy levels. As shown in the accompanying diagram, the emission spectrum of this atom will contain six transitions, labelled A - F.
Explain the process used to obtain the interval : Find a 98% confidence interval for the true proportion of patients who experienced cotton mouth. Show your calculations and/or explain the process used to obtain the interval.
What measures should restaurant take to maximize its profit : A trendy French restaurant is one of the first businesses to open in a small corner of a commercial building still under construction. The restuarant has received rave reviews and has lines of diners waiting for tables most nights.
Explain how performance readiness can be applied to teams : Explain how performance readiness can be applied to teams. Provide examples. Explain why teams are a competitive strategy for an organization. Provide examples.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Computer forensics investigation

After a computer forensics investigation, you require to meet with your section or group of fellow investigators and critique the case in an effort to improve your work.

  Estimating resources with the budget

Managing a project and I have an $850,000 budget. For the project, the resources include 4-developers and on project manager. A suppose that the average workweek per person is forty hours

  Determine public values transmitted for message

Alice and Bob select the numbers 6 and 10 privately. What will be public values they transmit and what would be final secret computed?

  Expected time to find user passwords by dictionary attack

Suppose that eight more characters were added to the password and that the DES algorithm was changed so as to use all 16 password characters. What would be the expected time to find all users' passwords using a dictionary attack?

  Explain advantages about solution of type of key

At ABC Institute, researchers are unsure about type of key (Asymmetric or Symmetric) to be used. Formulate possible solution and explain advantages and disadvantages of any solution employed.

  Research on workplace privacy laws

Determine how much time, if any, these two employees are spending surfing the Web. Is it wrong to access these records? Do some research on workplace privacy laws to justify your answer.

  Security vulnerabilities of vc

single access point (AP), wireless network, CSMA/CA, goals of information security, Wireless LANs, wireless hacking process, Wired Equivalent Privacy (WEP), Open System Authentication and Shared Key Authentication, Initialisation Vector (IV), RADIU..

  Describe the security features available on a platform

Describe the security features available on a platform of your choice (for example, Linux/Android/Mac OS X/Windows/Apache/Java/Perl), to mitigate a specific type of attack (for example, adware/malware/SQL injection/spoofing/tampering).

  How must one-s privacy be legally protected or secured

What does privacy mean to you? Is privacy a right or a privilege? How should one's privacy be legally protected or secured, especially when using the Internet?

  Explain prudent policy to protect datafrom corruption-theft

The opposing require to protect this data (from corruption and theft) which typically means controlling access to much/all of the data? What policy is prudent here?

  Compute value of shared secret key

You have secretly picked value SA = 17. You begin session by sending Bob your computed value of TA. Bob responds by sending you value TB = 291. What is the value of your shared secret key?

  Experiences with the social networking sites

Your experiences with the social networking sites like Craig list etc etc and Why do you think social networking sites are so popular? In other words, what is their stickiness?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd