E4277C1F-3738-46BE-BDCB-7140AD52C4D4

jpeg

School

DeVry University, Keller Graduate School of Management *

*We aren’t endorsed by this school

Course

310

Subject

Information Systems

Date

Dec 6, 2023

Type

jpeg

Pages

1

Uploaded by ConstableDinosaur3847

Report
Ngé Ngoc Tri Anh SE140023 Part A - List of Risks, Threats, and Vulnerabilities Commonly Found in an IT Infrastructure Risk Threat Vulnerability Primary Domain Impacted Unauthorized access from public Internet LAN / WAN Domain User destroys data in application and deletes all files User Domain Hacker penetrates your IT infrastructure and gains access to your internal network LAN / WAN Domain Intra-office employee romance “gone bad” fire destroys the primary data center System / Application Domain Communication circuit outages Remote Access Domain Workstation OS has a known software vulnerability Workstation Domain Unauthorized access to organization owned workstations LAN Domain Loss of production data Workstation Domain Denial of service attack on organization e-mail server System / Application Domain Remote communications from home office Remote Access Domain LAN server OS has a known software vulnerability LAN Domain User downloads an unknown e —mail attachment User Domain Workstation browser has software vulnerability Workstation Domain Service provider has a major network outage WAN Domain
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help