Learning Team Vulnerabilities and Threat Pairs

-13 (7 logical and 6 physical) Olive Green-13 (6 logical and 7 physical) Red-12 (6 logical and 6 physical) Purple- 12 (6 logical and 6 physical) OrangeVulnerabilities Threats Probability Impact Suggested Mitigation Steps
    Physical    
Card access Network Security      
Access Roster Confidentiality      
Biometrics Confidentiality      
Token Key Confidentiality      
Security Key Generator Network Security      
Video Monitoring Environmental      
Lack of IT support/Staff Availability      
Social Engineering of social medias Environmental      
Attacks on Mobile devices Integrity      
Legacy Systems Integrity      
Hardware failure Physical      
Lack of security Audits Network Security      
Missed security patches Network Security      
Terminated Employee Availability      
Wide Area Application Services Availability      
Buffer Overflow Confidentiality IntegrityAvailability      
VoIP Technology Confidentiality IntegrityAvailability      
Lack of Regular Updates of Antivirus Software Confidentiality IntegrityAvailability      
Lack of Physical Security Confidentiality IntegrityAvailability      
Unauthorized Access Confidentiality      
Unauthorized Downloads Availability      
Theft of Equipment Physical      
Destruction of Equipment Availability      
Environmental Disaster Environmental      
Equipment Disposal Environmental      
Vulnerabilities Threats Probability Impact Suggested Mitigation Steps
    Logical    
Group Policies Network Security      
Data Encryption Confidentiality      
Repository Availability      
Strong Passwords Network Security      
Permissions Confidentiality      
Port Security Network Security      
MAC filtering Integrity      
VPN Network Security      
DMZ Confidentiality      
Software vendors change ownership or go out of business Availability      
Software Bugs and design faults Integrity      
Wifi Vulnerabilities Network Security      
Lack of security policies Network Security      
Boot Sector Viruses Availability      
Logic bomb Availability      
Unsecured Wireless Network Confidentiality      
Keystroke logging Confidentiality      
Packet Collisions Confidentiality      
User errors Integrity      
Firewall Security Network Security      
Denial of Service Availability      
Wireless Security Network Security      
Antivirus Network Security      
Modification of Data Integrity      
Website Modification Integrity      

Place an Order

Plagiarism Free!

Scroll to Top