Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.

QUESTION

Section 4: Risk AssessmentAn intruder attack can be labeled mild or serious. An intruder attack  is labeled serious when an individual accesses confidential data,  performs unauthorized modification

Section 4: Risk Assessment

An intruder attack can be labeled mild or serious. An intruder attack  is labeled serious when an individual accesses confidential data,  performs unauthorized modifications to data, or disrupts the system.

Confidentiality, integrity, and availability are three basic targets for network security. Confidentiality ensures that private information is not made available to unauthorized individuals. Data integrity ensures that modifications to data are only done in an authorized manner by authorized personnel. System integrity ensures that a system performs its intended function without disruption or manipulation. Availability assures that systems function properly and that authorized users are not denied access.

Activities for a network risk assessment include but are not limited to the following:

  • Identification and analysis of assets and processes related to the system  
  • Identification and analysis of threats that could affect the confidentiality, integrity, or availability of the system  
  • Identification and analysis of system vulnerabilities  
  • Identification and analysis of protection requirements to mitigate the risks 

As system administrator, you need to further develop your Network  Architecture Security Plan Proposal for your organization with a risk  assessment.

In this section, perform a risk assessment on your network. The assessment should include the following:

  • Identify system assets such as hardware, software, data, and communication lines.  
  • Check for appropriate security policies.  
  • Check all patch levels and updates.  
  • Check physical security.  
  • Probe the system for vulnerabilities.  
  • Document specific steps taken in the assessment, list any risks  found, and list recommendations for corrective actions to mitigate the  risks. 

Be sure to update your table of contents before submission.

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question