Learning Team Ranking the Pairs

VulnerabilitiesThreatsProbabilityImpactSuggested Mitigation Steps
  Physical  
Card accessNetwork SecurityHighAccess any physical location permitted by the card.Practice having your card on you at all times. This ensures having your card will always be on you.
Access RosterConfidentialityLowBypass authenticationDouble and triple check user on access roster.
BiometricsConfidentialityLowBuilding, data, hardware accessImplement roper training. Not used enough
Video MonitoringEnvironmentalLowSurveillance of networkMonitor video cabling and monitor from an individual room
Lack of IT support/StaffAvailabilityMediumPreventive Maintenance over looked, no Separation of DutiesMaintain Separation of Duties, Security Audits
Attacks on Mobile devicesIntegrityHighViruses, attack to network, dataMaintain policies per network/system requirements
Legacy SystemsIntegrityLowUpdates, patches, compatibilitySchedule Update maintain regular replacement program
Hardware failurePhysicalLowUpdates, patches, compatibilitySchedule Update maintain regular replacement program
Missed security patchesNetwork SecurityMediumOutdated SecurityKeep update schedule, regular audits
Terminated EmployeeConfidentiality IntegrityAvailabilityHighTrade secretsImplement confidential information use and protection policies, protocols for handling departing employees.
Wide Area Application ServicesAvailabilityHighCause a targeted device to reset. Attacks that result in a DoS condition.Implement IP-based access control lists (ACLs) to allow only trusted systems to access the affected devices.
Buffer OverflowConfidentiality IntegrityAvailabilityMediumCode execution, Denial of serviceBuffer overflow protection
VoIP TechnologyConfidentiality IntegrityAvailabilityMediumTie up network so its unusableDocumented VoIP security policy, implement a defense-in-depth layered approach. 
Lack of Physical SecurityPhysicalHighUnauthorized or covert access, and forcible attack.CCTV coverageSecurity lightingSecurity guard
Unauthorized AccessConfidentialityHighViruses, missing data, computer vandalizeAccess control security measures
Unauthorized DownloadsAvailabilityHighViruses, Trojan’s, ect.Block access to unauthorized/illegal software education and awareness
Theft of EquipmentPhysicalMediumMissing data, company loss, security secretsUse physical security measures
Destruction of EquipmentAvailabilityLowMissing data, company lossesUse physical security measures
Environmental DisasterEnvironmentalLowMissing data, company loss, DeathCan use a backup disaster recovery plan
Equipment DisposalEnvironmentalLowEnvironmental laws, fees, environment destructionEnsure that all devices are whipped clean before disposal
VulnerabilitiesThreatsProbabilityImpactSuggested Mitigation Steps
  Logical  
Group PoliciesNetwork SecurityHighAlter polices and turn on turned off setting and accessMonitor group polices on a bi-weekly basis. Make sure no modifications have been made.
Data EncryptionConfidentialityMediumDecrypt important secretive informationDecryption must be done correct. No acceptations.
RepositoryAvailabilityLowNo means of back up data.Always back all information and never overwrite backups.
Strong PasswordsNetwork SecurityMediumAble to access user/email accounts, computers, and servers.Implement password security.
PermissionsConfidentialityLowAccess specific filesMake sure sufficient but too much permissions are given. Need to know!
VPNNetwork SecurityMediumOnline attack of system, able to access system, accounts, email.Deny LAN traffic but VPN. Strong passwords, Use of OTP (one time passwords)
DMZConfidentialityHighDirect line to hacker or attack. Direct access to external network equipmentDual firewalls, Subnets
Software Bugs and design faultsIntegrityMediumHackers can manipulate code, gain access. Send viruses,Audit designs, testing system, software before releasing. Following strong testing policies.
Wifi VulnerabilitiesNetwork SecurityHighAccess to network, hackers backdoor vulnerable devicesFirewalls, strong passwords, Proxy servers
Lack of security policiesNetwork SecurityHighWeaknesses in networks, preventive maintenance.Strong policies, security audits. Separation of duties
Boot Sector VirusesAvailabilityMediumInability to access hard driveand application failure`Boot sector antivirus protector
Logic bombAvailabilityMediumDelete or corrupt dataAnti-virus program
Unsecured Wireless NetworkConfidentialityHighCapture network data or attacks the computerCreate a Security PolicyConfigure for Secured Network AccessCreate Service Set Identifier (SSID)
Keystroke loggingConfidentialityMediumIdentity theft, espionage, or data breachEncryption installing “anti-key logging keystroke encryption software and other antivirus software
Packet CollisionsConfidentialityMediumloss of the data and require retransmission.CSMA/CD (Carrier Sense Multiple Access/Collision Detection) on 802.3 networks
User errorsData and System IntegrityHighData corruptionTraining to educate on how to deal with security threats
Firewall SecurityNetwork SecurityMediumLoads of wrong packets coming in and out of the network, slow down network or many virus or Trojan’sEnable rules and polices to block dangerous data from entering the network
Denial of ServiceAvailabilityMediumNo one will be able to visit website or place orders, company loss of money (income)Firewalls and active IPS
AntivirusNetwork SecurityHighViruses through out companies equipment, Trojan’sInstall antivirus software and make sure up to date
Modification of DataIntegrityHighLoss data, company lossesEncryption, strong access control
guardUnauthorized AccessConfidentiality HighViruses, missing data, computer vandalize Access control security measuresUnauthorized DownloadsAvailability HighViruses, Trojan’s, ect. Block access to unauthorized/illegal software education and awarenessTheft of EquipmentPhysicalMedium Missing data, company loss, security secrets Use physical security measures Destruction of EquipmentAvailabilityLowMissing data, company losses Use physical security measures Environmental DisasterEnvironmentalLowMissing data, company loss, DeathCan use a backup disaster recovery planEquipment DisposalEnvironmental LowEnvironmental laws, fees, environment destruction Ensure that all devices are whipped clean before disposalVulnerabilitiesThreats ProbabilityImpactSuggested Mitigation Steps  Logical  Group PoliciesNetwork SecurityHighAlter polices and turn on turned off setting and accessMonitor group polices on a bi-weekly basis. Make sure no modifications have been made.Data Encryption ConfidentialityMediumDecrypt important secretive information
File Type:docx

---More Text Follows---

Buy to view complete answer, price $45
Money Back guarantee







Place an Order

Plagiarism Free!