| -13 (7 logical and 6 physical) Olive Green-13 (6 logical and 7 physical) Red-12 (6 logical and 6 physical) Purple- 12 (6 logical and 6 physical) OrangeVulnerabilities | Threats | Probability | Impact | Suggested Mitigation Steps |
| Physical | ||||
| Card access | Network Security | |||
| Access Roster | Confidentiality | |||
| Biometrics | Confidentiality | |||
| Token Key | Confidentiality | |||
| Security Key Generator | Network Security | |||
| Video Monitoring | Environmental | |||
| Lack of IT support/Staff | Availability | |||
| Social Engineering of social medias | Environmental | |||
| Attacks on Mobile devices | Integrity | |||
| Legacy Systems | Integrity | |||
| Hardware failure | Physical | |||
| Lack of security Audits | Network Security | |||
| Missed security patches | Network Security | |||
| Terminated Employee | Availability | |||
| Wide Area Application Services | Availability | |||
| Buffer Overflow | Confidentiality IntegrityAvailability | |||
| VoIP Technology | Confidentiality IntegrityAvailability | |||
| Lack of Regular Updates of Antivirus Software | Confidentiality IntegrityAvailability | |||
| Lack of Physical Security | Confidentiality IntegrityAvailability | |||
|---|---|---|---|---|
| Unauthorized Access | Confidentiality | |||
| Unauthorized Downloads | Availability | |||
| Theft of Equipment | Physical | |||
| Destruction of Equipment | Availability | |||
| Environmental Disaster | Environmental | |||
| Equipment Disposal | Environmental |
| Vulnerabilities | Threats | Probability | Impact | Suggested Mitigation Steps |
|---|---|---|---|---|
| Logical | ||||
| Group Policies | Network Security | |||
| Data Encryption | Confidentiality | |||
| Repository | Availability | |||
| Strong Passwords | Network Security | |||
| Permissions | Confidentiality | |||
| Port Security | Network Security | |||
| MAC filtering | Integrity | |||
| VPN | Network Security | |||
| DMZ | Confidentiality | |||
| Software vendors change ownership or go out of business | Availability | |||
| Software Bugs and design faults | Integrity | |||
| Wifi Vulnerabilities | Network Security | |||
| Lack of security policies | Network Security | |||
| Boot Sector Viruses | Availability | |||
| Logic bomb | Availability | |||
| Unsecured Wireless Network | Confidentiality | |||
| Keystroke logging | Confidentiality | |||
| Packet Collisions | Confidentiality | |||
| User errors | Integrity | |||
| Firewall Security | Network Security | |||
| Denial of Service | Availability | |||
| Wireless Security | Network Security | |||
| Antivirus | Network Security | |||
| Modification of Data | Integrity | |||
| Website Modification | Integrity |
Click following link to download this document
CMGT 430 Week 2 Learning Team Vulnerabilities and Threat Pairs.docx
Place an Order
Plagiarism Free!
Create an Account
Create an account at Top Tutor Online
- Allows you to track orders.
- Receive personal messages.
- Send messages to a tutor.
Post a Question/ Assignment
Post your specific assignment
- Tutors will be notified of your assignment.
- Review your question and include all the details.
- A payment Link will be sent to you.
Wait for your Answer!
Make payment and wait for your answer
- Make payment in accordance with the number of pages to be written.
- Wait for your Answer as a professional works on your paper.
- You will be notified when your Answer is ready.