100%(1)1 out of 1 people found this document helpful
This preview shows page 1 - 3 out of 4 pages.
Running head: THREATS AND VULNERABILITIES1Threats and VulnerabilitiesDamani CampbellPost University
THREATS AND VULNERABILITIES2Threats and VulnerabilitiesNow that the security plan is set, I want to introduce the new threat and vulnerabilitycontrol plan. I came up with this plan to better the account for the availability, reliability,confidentiality, and integrity of the company. The fact of the matter is, not only our company, butevery company with an internet connection is at risk. Potential attackers are getting more andmore advanced as the technology of this new age grows at a significant rate. We have recentlyovercome a threat through our email system that put out IT security team to the test. The treatincorporated multiple steps and crossed different vectors. The new threat and vulnerability planwill include additional solutions to these threats, better workflow, and add to a better and widerunderstanding of how antagonists may attack (Core Security, n.d.).