Chat with us, powered by LiveChat What are typical information security (IS) assets that are used by such a company, and what risks exist in the current model? - EssayAbode

What are typical information security (IS) assets that are used by such a company, and what risks exist in the current model?

The case study company provided a situation in which threats pose a real risk to the infrastructure. The company assets are not well-protected, and they all share a common network. Little additional security mechanisms are in place other than the demilitarized zone (DMZ). What are typical information security (IS) assets that are used by such a company, and what risks exist in the current model? What will adding a flexible solution for the consultants to connect to the network do to this risk model? What are some safeguards that can be implemented to reduce the risk?

Week 2: Security Assessment

A description of typical assets

A discussion about the current risks in the organization with no network segregation to each of the assets

A discussion about specific risks that the new consultant network will create

Details on how you will test for risk and conduct a security assessment

A discussion on risk mitigation

Related Tags

Academic APA Assignment Business Capstone College Conclusion Course Day Discussion Double Spaced Essay English Finance General Graduate History Information Justify Literature Management Market Masters Math Minimum MLA Nursing Organizational Outline Pages Paper Presentation Questions Questionnaire Reference Response Response School Subject Slides Sources Student Support Times New Roman Title Topics Word Write Writing