Asset_Ident.docx CMGT/431 Week 2 Security Vulnerability Report Security Vulnerability Report A vulnerability report assessment is of key importance any to most organization. Here at Toys-R-Us we know the process of
...
Asset_Ident.docx CMGT/431 Week 2 Security Vulnerability Report Security Vulnerability Report A vulnerability report assessment is of key importance any to most organization. Here at Toys-R-Us we know the process of securing our network infrastructure must go beyond patch management and antivirus software. Toys-R-Us had identified key security vulnerabilities that will be reviewed and illustrated in the following report. Some of these vulnerabilities include incompatible software applications, outdated or legacy hardware and software. Because Toys-R-Us operates in stores across the country, hackers may target this company seeking financial gain. Therefore, the entire infrastructure must be beefed up to protect this company from outside and inside threats. These are issues that contribute to the vulnerability of security of the company network and infrastructure. Customer are the focus and protecting their personal identifiable information from outside intruders is paramount due to the increase in identify theft in our area and across the country. Crypto-virus has reared its ugly head once again, so keeping out weaknesses in the network infrastructure must be done right away. Scope The events here are within the scope of this report: ¢Each Store location must endure a site visit to ascertain vulnerabilities and threats onsite. ¢Key Stakeholders will meet to review findings of the attached vulnerability report. ¢Building security must be evaluated and must be secured to preve. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . .. .. . . . . . . . . . . . . . . . . . .. . . . .
[Show More]