Business > CASE STUDY > CMGT 431 Wk2_Security_Vulnerability_Report.docx CMGT/431: Security Vulnerability Report (All)
CMGT 431 Wk2_Security_Vulnerability_Report.docx CMGT/431: Security Vulnerability Report Infrastructure security is primordial for business success. Good network security helps PPK reduce the risk of ... falling victim to hackers. Network security helps protect company computer systems, Network, and organization Data from harmful threats. PPK infrastructure team oversees securing the network, computer system, Data, and applications. After conducting an evaluation on the internal infrastructure several vulnerabilities were discovered. This is a list of some of the vulnerabilities. No formal remote worker policy in place, no software management policy, and no formal process for reporting the security incident. In this paper, I will enumerate the vulnerabilities found by considering the process, people, and technology that can be exploited by the threat. I will also be recommended countermeasures to mitigate the impacts of the vulnerabilities. The first vulnerability found was no formal remote worker policy. Workers connect to PPK network with their own equipment. The vulnerability severity is high which means That network can be accessed by unauthorized users and hackers. The fact that employees can work using their own equipment is a BYOD (Bring Your Own Device) policy. The BYOD can be a security risk if no security policy is in place for remote work. With no security device and policy in place, anyone can access the company network, computer system, and Database. For example, hackers can use a spoofing attack to access the n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . .. .. . . . . . . . . . . . . . . . . . .. . . . . [Show More]
Last updated: 3 years ago
Preview 1 out of 4 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Jun 19, 2022
Number of pages
4
Written in
All
This document has been written for:
Uploaded
Jun 19, 2022
Downloads
0
Views
53
Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.
We're available through e-mail, Twitter, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·