Threats and Vulnerabilities.doc - Running head: THREATS AND...

This preview shows page 1 - 3 out of 4 pages.

Running head: THREATS AND VULNERABILITIES1Threats and VulnerabilitiesDamani CampbellPost University
THREATS AND VULNERABILITIES2Threats and VulnerabilitiesNow that the security plan is set, I want to introduce the new threat and vulnerabilitycontrol plan. I came up with this plan to better the account for the availability, reliability,confidentiality, and integrity of the company. The fact of the matter is, not only our company, butevery company with an internet connection is at risk. Potential attackers are getting more andmore advanced as the technology of this new age grows at a significant rate. We have recentlyovercome a threat through our email system that put out IT security team to the test. The treatincorporated multiple steps and crossed different vectors. The new threat and vulnerability planwill include additional solutions to these threats, better workflow, and add to a better and widerunderstanding of how antagonists may attack (Core Security, n.d.).

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 4 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
N/A
Tags

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture