Course Hero Logo

M6A2 Lab Recommending IT Security Policies to Help Mitigate Risk.doc

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 1 - 3 out of 4 pages.

Running head: M6A2: Lab: Recommending IT Security Policies to Help Mitigate Risk1M6A2: Lab: Recommending IT Security Policies to Help Mitigate RiskCYS541: Ethics, Legal, and Compliance issues in CybersecurityJoel MolinaExcelsior College
M6A2: Lab: Recommending IT Security Policies to Help Mitigate RiskRisk exposures:1. Workstation domains are exposed to software scalability, which creates a risk of ahacker connecting remotely to steal important data that can be stored in students, principal,and teacher computers.2. LAN Domains are exposed to viruses such as a worm that can spread through all ofthe software and damage/delete important data; servers are also exposed to DOS or DDOSattack.3. Weakened traffic due to the extensive number of users can degrade performanceand make the educational process of students and teachers less effective.4. Primary data is exposed to natural and other disasters such as a fire.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 4 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Spring
Professor
RichardJ.Perry

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture