Analyze IT security vulnerabilities and available security and data protection t
ID: 358933 • Letter: A
Question
Analyze IT security vulnerabilities and available security and data protection technologies that can be applied to your project based on this week's readings (Essentials of MIS, Ch. 8 and Week 4 Electronic Reserve Readings). Create a Microsoft® Word plan of no more than 350 words that includes the following:
Describe the internal and external threats to security for your project.
Outline which type of security and threat prevention technology you recommend for your project and how it will be implemented. Your goal is to protect the privacy and financial information of your company and your potential customers.
Cite a minimum of 2 peer-reviewed references from the University of Phoenix Library.
Explanation / Answer
It is important to plan for security of IT systems. Full risk assessment of the system should be performed for security planning of IT system. This involves development of security policies and implementation of control systems to prevent computer risks. IT security vulnerabilities and threats can arise from three sources: Internal malicious attackers, unintentional risks that may arise from employee errors & omission and third from natural disaster like fire etc.
The reason for threats to be persistent is because of vulnerabilities that arises because of one or many reasons such as poor network design, end-user carelessness, misconfigured hardware or software, intentional end-user acts and inherent technology weaknesses.
After the network components are identified, their vulnerabilities can be assessed. Once vulnerability is discovered, it is extremely important to address it in order to mitigate any threat that could take advantage of the vulnerability.
Several methods can be applied for fixing the identified vulnerabilities. These are as follows:
Internal and external threats to security of project:
Internal threats: These threats occur when someone that has authorized access to the network with either an account on a server or physical access to the network. As per the data reveled by FBI, internal access and misuse account for 60 percent to 80 percent of reported incidents of system security compromised.
External threats: These are the threats arise from organizations or individuals working outside the company. The one who do not have authorized access to the computer systems or network but they work their way into a network mainly from the Internet or dial up access servers.
The type of security and threat prevention technology that I recommend for our project is implementation of technologies such as firewalls, intrusion-detection tools, content filters, traffic analyzers, and VPNs. In order to have best practices for continuous risk assessment and vulnerability testing.
The implementation of above mentioned technologies can help in protecting the privacy and financial information of our company and our potential customers.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.