SE571 Course Project PhaseII R
in Other (Education) by neelYour Price: $20.00 (30% discount)
You Save: $8.57
Description
Security Assessment and Recommendations
(Phase II)
Ravindra Patel
Submitted to: Professor John Michalek
SE571 Principles of Information Security and Privacy
Keller Graduate School of Management
Submitted: February 21, 2014
Table of Contents
Two Security Vulnerabilities7
Hardware Vulnerability7
After carefully investigation of the network infrastructure, it has been found that Commercial Division of the company connects to the Internet directly without any firewall hardware to protect it from the rest of the world. The CD also connects to the Headquarters via Internet. This weakness of the company is a major security threat. Without any firewall, the company cannot protect itself from attackers or outside threats (such as worms and Trojan horse viruses, known as...