2-2 Activity Identifying Threats and Vulnerabilities.docx -...

This preview shows page 1 - 3 out of 5 pages.

Identifying Threats and Vulnerabilities 1Identifying Threats and VulnerabilitiesIT-313-H3297 Risk Mgmt/Mitigation Sys DesJanuary 17, 2021Information Security Assignment1.Identify threats to the seven domains of IT within the organization.
Identifying Threats and Vulnerabilities 2According toStewart (2013),no IT infrastructure is without risks. Analyzing each one ofthe seven domains of the Fertilizer Plus IT infrastructure, the following threats were discovered.DomainThreatsRemote Access DomainVPN threats and exploitsSystems/Application DomainThreats from internal personnel, intentionaldamageUser DomainNetwork availability threatsLAN DomainThreats from external entitiesLAN-to-WAN domainInternetWorkstation DomainHardware failure2.Identify vulnerabilities in the seven domains of IT within the organization.The following are the vulnerabilities identified within the seven domains of theorganization's IT infrastructure:The network is not placed within a demilitarized zone (DMZ).Firewall misconfiguration (A firewall should be configured in front and behind therouter)Weak authentication vulnerabilities

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 5 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
N/A
Tags
Virtual private network

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture