Unformatted text preview: future risks may arise. Part of a risk assessment knows no system will be one hundred percent secure. Report recommending specific strategies and best practices for implementation: The implementation of social media sites and network apps are the result of specific strategies and best practices for mitigating known web risks, threats, and vulnerabilities. Harden the network by utilizing IDS, IPS and firewalls. Data in motion and at rest should be secure and encrypted. Training and education on potential dangers and strategies of social engineering will help to mitigate the effectiveness of potential hackers. Vulnerability tools allow the company to stay ahead of potential attacks. These tools also allow the company to secure vulnerabilities before malicious users can exploit the weakness....
View Full Document
- Fall '13