Threats
.docx
keyboard_arrow_up
School
University of Louisiana, Lafayette *
*We aren’t endorsed by this school
Course
590
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
3
Uploaded by ChancellorWrenMaster1014
4. Threats and Vulnerabilities
In addition to threats previously identified, a broader re-evaluation may uncover
additional threats:
a). Threats
1.
Unauthorized extraction or loss of data from main servers.
2.
Misappropriation or loss of data from company devices.
3.
Disruption of organizational operations due to events, such as natural
disasters or unstable software.
4.
Cyber threats targeting Health Network’s internet-accessible products.
5.
Insider threats from employees or associates.
6.
Regulatory changes that could affect our operations.
b) Vulnerabilities:
1.
Weak access controls and authentication mechanisms.
2.
Inadequate physical security measures.
3.
Lack of regular vulnerability assessments and patch management.
4.
Insufficient disaster recovery and backup processes.
5.
Incomplete or outdated documentation of IT processes and configurations.
5. Types of Controls to be Assessed
Our assessment will evaluate both the existing and potential controls in various
categories:
1.
Physical Security Controls:
Think of these as the physical bodyguards of
our system. These systems keep an eye on our important tech locations like
CCTV cameras or monitor who comes and goes with biometric access points.
It is like having a bouncer for your network who checks IDs at the door.
2.
Network Security Controls:
These safeguard our network and prevent any
obtrusive intruders. They detect hazards and neutralize them as they arise,
acting as our network's immune cells. Our network is protected from
unwanted access by firewalls, and Intrusion Detection and Intrusion
prevention systems function as immunity cells that monitor and neutralize
invaders.
3.
Server Security Controls:
These protective measures are like the guardians
of the server realm, always watching and ready to act protecting our servers.
Regularly updating the server's software is like giving it essential vitamins and
nutrients, while antivirus solutions act as an extra layer of defensive Armor
against malicious invaders.
4.
Access Control Measures:
Imagine these like different keys given to
different members of a family. Everyone has access to the front door, but only
parents have the safe's key. Similarly, these policies ensure employees can
only access data they need for their jobs, acting as a key inspector and
distributor.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help