Preview

Nt1310 Unit 3 Assignment 1

Good Essays
Open Document
Open Document
1244 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 3 Assignment 1
Analysis and explanation of the threat and vulnerability pairs and their likelihood of occurrence. The chart explains the aspects of the vulnerabilities and threats. b\Because we have no data on these threats on the amount of occurrences we cannot assign an impact rating or a probability rating in which is high medium an low (reference page 121 of book)
Vulnerability
Threat
Probability
Impact
Suggested Mitigation Steps
Lack of network security controls
Denial of service attacks
High
High
Enforce security controls
Unencrypted data
Eavesdropping and Interception of data
Low
High
Enforce security controls
Insufficient patch management
Exploiting weaknesses
Medium
High
Enforce security controls
Weak Passwords
Unauthorized system access
Low
High
Enforce security controls
Insufficient backups
Unrecoverable data due to natural or human error
High
High
Sufficient back ups training
Lack of user monitoring
Unauthorized users performing access to sensitive data
High
High
Monitoring control software
Lack of logging and monitoring controls
Unchecked data viewing or alteration
Low
High
Enforce security controls
Monitoring control software
…show more content…
The reason is simple the company produces fertilizers and with in fertilizers is a highly sought after component by terrorists. This component is nitrates. The second factor I used to select the mitigation/avoidance technique is that some of the locations are in tornado ally and or near rivers and previously flooding areas. A transfer method in all regards if possible outsource what can be outsourced thru web services will be done so as it is the least costly most effective method of backup, off site location, redundancy, encryption and security available by type of function or service IE accounting, HR /Intuit, Web site, Training, email,

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The problematic scenario is when the physical sequence has a loop. In this scenario, a switch which is attached to the middlebox literally cannot identify the middlebox segment based on the combination of the input interface and packet header fields. To address this scenario, SIMPLE introduce a ProcState tag that encodes the packet’s processing state inside the packet header fields using either VLAN tags, unused fields in the IP headers i.e., IP ToS fields or MPLS labels depending on the fields supported in the SDN-enabled switches. Therefore, SDN controller installs tag addition forwarding rules at the first switch of each middlebox segment, which is based on packet header fields and input ports of the switch. In addition, downstream switches consider these tags for the matching purpose and perform respective forwarding action. This process continues until the middlebox segment is finished.…

    • 241 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    A good example of refraction of light and reflection of light is a rainbow. Sunlight enters the rain droplet at a specific angle and the rain droplet separates the white light into many different colors. This angle is a fixed measurement between your eye and the sun. What color is refracted depends upon the critical angle, which is the angle the sunlight strikes the back of the rain droplet. Red light bends the least while violet light bends the most all the other colors bend at an angle that is between the two. Each rain droplet reflects all colors at a given point and time, but only one color comes back to your eye, requiring millions of rain droplets to create a rainbow. As the rain droplets fall…

    • 395 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT1310 Unit 1 Assignment 1

    • 4837 Words
    • 20 Pages

    In order to get some statistical data about the number of formula 1 crashes and their causes, we randomly picked up 1 race from each year starting from 1960 up till 2013, then extrapolated results to the respective entire year, and then calculated average numbers. Based on those figures we compiled the table below.…

    • 4837 Words
    • 20 Pages
    Good Essays
  • Satisfactory Essays

    IS3110: Unit 1 Role Scenario 1) Identify threats to the seven domains of IT within the organization: A. User: Destroy data B. Workstation: Loss of data, not updated C. LAN: Unauthorized user, weak password D. LAN –WAN: Hackers, weak traffic filtering E. WAN- FTP anon uploads, DoS/DDoS F. System Application: Fire, DoS/DDoS, SQL injection corrupting data G. Remote: user virus, remote from office unsecure, VPN tunnel hack 2) Identify vulnerabilities in the seven domains of IT within the organization. A. User: Infected media, social engineering B. Workstation: OS vulnerability, browser vulnerability C. LAN: Worms, LAN OS vulnerability D. LAN-WAN: malicious websites, unblocked ports E. WAN: network outages F. System Application: ISP…

    • 259 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    5) It contain all the information about the shortcut button which shows left sight in lotus.…

    • 528 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Assignment 1

    • 407 Words
    • 2 Pages

    II. Analysis. The intent for this program is to calculate the square footage of a house with no more than four rooms that are rectangular in shape. In order to do this we will identify each room, input the length (l) and width (w) of each room, multiply the l x w of each room to get the square foot, and add the sum of each room to secure the total square footage of the house.…

    • 407 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 4503 Words
    • 19 Pages

    From the knowledge gained, the student are requires to draft a new version of OS that include a new name for the OS , LOGO, design principles and so on and prepare for the Report and presentation…

    • 4503 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    G. Work in pairs. Now go back to exercise D. Use five words in the vocabulary box to help you make another five sentences about a list of things to do or take for a picnic. Remember to use imperatives.…

    • 60 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Nt1310 Unit 1 Assignment 1

    • 7711 Words
    • 31 Pages

    The changing needs of people led to the development of a means to make tasks a lot easier and more convenient. This is technology. It is a tool that now plays an important role in people’s everyday life. Because of this technology every complicated task is now provided with an equal solution. Hence, the difficulties that people experience in doing tasks are minimized. It is not impossible that in the near future, these difficulties will be eliminated. When this happens, industrial evolution will surely take place.…

    • 7711 Words
    • 31 Pages
    Better Essays
  • Satisfactory Essays

    1. Discuss common forms of attack on Microsoft systems using the text Internet, and/or your job as reference for full credit.…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    I am now a student at Muskingum University in New Concord, Ohio. One of the courses I am taking is EDucation 110 which is an introduction to education. We have talked about teachers in our K-12 years who have made a difference in our lives. I wanted to let you know you made a difference in my life.…

    • 261 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    | Describe the threats to system and information security and integrityThe possible threats to information security may be: from theft, unauthorised access, accidental file deletion, use of removable storage media; malicious programs (including viruses, trojans), hackers, phishing and identity theft; unsecured and public networks, default passwords and settings, wireless networks, Bluetooth, portable and USB devices.…

    • 793 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Once you have enough information to understand how the target works and what information of value might be available, you begin the process of scanning perimeter and internal network devices looking for weaknesses, including…

    • 284 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Aup Definition

    • 554 Words
    • 3 Pages

    I have indicated the best options for controlling and monitoring three of the policy violations and security breaches from the list.…

    • 554 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Disaster Plan

    • 1162 Words
    • 3 Pages

    The way in which XYZ Computers has their IST Department set up currently is susceptible to many threats. The lack of a firewall is an open invitation for data to be stolen by prying eyes, and the vulnerability of placing the payroll database is in the same server as the email service. The geographic and weather conditions of the location of the company have a high risk of flooding, yet the Servers were installed on the first floor. Lastly, the backup method in place is sort of outdated and there is no mention on how often the backup takes place; additionally, the backup tapes themselves could be damaged, lost, or stolen. These recommendations are an attempt to improve XYZ Computer’s network data security, prevention of data loss, protection against network failure, and contingencies for natural disasters.…

    • 1162 Words
    • 3 Pages
    Good Essays