-13 (7 logical and 6 physical) Olive Green-13 (6 logical and 7 physical) Red-12 (6 logical and 6 physical) Purple- 12 (6 logical and 6 physical) OrangeVulnerabilities | Threats | Probability | Impact | Suggested Mitigation Steps |
Physical | ||||
Card access | Network Security | |||
Access Roster | Confidentiality | |||
Biometrics | Confidentiality | |||
Token Key | Confidentiality | |||
Security Key Generator | Network Security | |||
Video Monitoring | Environmental | |||
Lack of IT support/Staff | Availability | |||
Social Engineering of social medias | Environmental | |||
Attacks on Mobile devices | Integrity | |||
Legacy Systems | Integrity | |||
Hardware failure | Physical | |||
Lack of security Audits | Network Security | |||
Missed security patches | Network Security | |||
Terminated Employee | Availability | |||
Wide Area Application Services | Availability | |||
Buffer Overflow | Confidentiality IntegrityAvailability | |||
VoIP Technology | Confidentiality IntegrityAvailability | |||
Lack of Regular Updates of Antivirus Software | Confidentiality IntegrityAvailability | |||
Lack of Physical Security | Confidentiality IntegrityAvailability | |||
---|---|---|---|---|
Unauthorized Access | Confidentiality | |||
Unauthorized Downloads | Availability | |||
Theft of Equipment | Physical | |||
Destruction of Equipment | Availability | |||
Environmental Disaster | Environmental | |||
Equipment Disposal | Environmental |
Vulnerabilities | Threats | Probability | Impact | Suggested Mitigation Steps |
---|---|---|---|---|
Logical | ||||
Group Policies | Network Security | |||
Data Encryption | Confidentiality | |||
Repository | Availability | |||
Strong Passwords | Network Security | |||
Permissions | Confidentiality | |||
Port Security | Network Security | |||
MAC filtering | Integrity | |||
VPN | Network Security | |||
DMZ | Confidentiality | |||
Software vendors change ownership or go out of business | Availability | |||
Software Bugs and design faults | Integrity | |||
Wifi Vulnerabilities | Network Security | |||
Lack of security policies | Network Security | |||
Boot Sector Viruses | Availability | |||
Logic bomb | Availability | |||
Unsecured Wireless Network | Confidentiality | |||
Keystroke logging | Confidentiality | |||
Packet Collisions | Confidentiality | |||
User errors | Integrity | |||
Firewall Security | Network Security | |||
Denial of Service | Availability | |||
Wireless Security | Network Security | |||
Antivirus | Network Security | |||
Modification of Data | Integrity | |||
Website Modification | Integrity |
Place an Order
Plagiarism Free!
Create an Account
Create an account at Top Tutor Online
- Allows you to track orders.
- Receive personal messages.
- Send messages to a tutor.
Post a Question/ Assignment
Post your specific assignment
- Tutors will be notified of your assignment.
- Review your question and include all the details.
- A payment Link will be sent to you.
Wait for your Answer!
Make payment and wait for your answer
- Make payment in accordance with the number of pages to be written.
- Wait for your Answer as a professional works on your paper.
- You will be notified when your Answer is ready.