CYB400_Project_One_Security_Assy_Adrienne_Johnston

.docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

400

Subject

Information Systems

Date

Apr 3, 2024

Type

docx

Pages

4

Uploaded by johnstondarcy

Report
Project One: Security Assessment Recommendations Cyb 400 Adrienne Johnston SNHU
Introduction Grey Matter has recently been acquired by BrainMeld, and all of its assets. Included in the acquisition would be Grey Matter’s network. Its current state has been found unsatisfactory for BrainMeld’s business goals. The new staff has created several reports that give insight to the safety of the current network configurations, and recommendations for change. Security Recommendations: Scheduled Maintenance One of the least complicated tools to assure a degree of safety is to implement scheduled maintenance of computing assets throughout an organization. This comes in the forms of software updates, computer maintenance, physically cleaning components, and replacing surge protectors at a predetermined interval. The server issues in their current state can allow for remote access by threat actors resulting in costly security issues to the company and its personnel. Issues such as malware, credential theft, keylogging, and many more. Software updates include anti-virus protection to shield from denial of service attacks, malware, botnets, and ransomware to name a few. Many applications that run on the company network will require updates, patches, or hotfixes in order to fix bugs, security holes, and streamline performance. Applications like the operating system, mail servers, networking hardware and software, servers, firewalls, databases, etc. The vulnerabilities discovered during BrainMeld’s initial audit should be sufficiently corrected by utilization of the above corrective, preventative, and risk-based actions. Security Recommendations: Policy Updates The weakest link in a sound security posture is usually the employees. This can result from levels of experience and/or training or even a threat actor within an organization. We can only
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help