Business  >  CASE STUDY  >  CMGT 431 Wk2_Security_Vulnerability_Report.docx CMGT/431: Security Vulnerability Report (All)

CMGT 431 Wk2_Security_Vulnerability_Report.docx CMGT/431: Security Vulnerability Report

Document Content and Description Below

CMGT 431 Wk2_Security_Vulnerability_Report.docx CMGT/431: Security Vulnerability Report Infrastructure security is primordial for business success. Good network security helps PPK reduce the risk of ... falling victim to hackers. Network security helps protect company computer systems, Network, and organization Data from harmful threats. PPK infrastructure team oversees securing the network, computer system, Data, and applications. After conducting an evaluation on the internal infrastructure several vulnerabilities were discovered. This is a list of some of the vulnerabilities. No formal remote worker policy in place, no software management policy, and no formal process for reporting the security incident. In this paper, I will enumerate the vulnerabilities found by considering the process, people, and technology that can be exploited by the threat. I will also be recommended countermeasures to mitigate the impacts of the vulnerabilities. The first vulnerability found was no formal remote worker policy. Workers connect to PPK network with their own equipment. The vulnerability severity is high which means That network can be accessed by unauthorized users and hackers. The fact that employees can work using their own equipment is a BYOD (Bring Your Own Device) policy. The BYOD can be a security risk if no security policy is in place for remote work. With no security device and policy in place, anyone can access the company network, computer system, and Database. For example, hackers can use a spoofing attack to access the n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . .. .. . . . . . . . . . . . . . . . . . .. . . . . [Show More]

Last updated: 3 years ago

Preview 1 out of 4 pages

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)
Preview image of CMGT 431 Wk2_Security_Vulnerability_Report.docx  CMGT/431: Security Vulnerability Report document

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Reviews( 0 )

$10.00

Buy Now

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Instant download

Can't find what you want? Try our AI powered Search

53
0

Document information


Connected school, study & course


About the document


Uploaded On

Jun 19, 2022

Number of pages

4

Written in

All

Seller


Profile illustration for helperatsof1
helperatsof1

Member since 4 years

48 Documents Sold

Reviews Received
1
0
0
0
2
Additional information

This document has been written for:

Uploaded

Jun 19, 2022

Downloads

 0

Views

 53

Document Keyword Tags

Recommended For You

Get more on CASE STUDY »

$10.00
What is Scholarfriends

Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.

We are here to help

We're available through e-mail, Twitter, and live chat.
 FAQ
 Questions? Leave a message!


Copyright © Scholarfriends · High quality services·