Best writers. Best papers. Let professionals take care of your academic papers

Order a similar paper and get 15% discount on your first order with us
Use the following coupon "FIRST15"
ORDER NOW

Learning Demonstration: Vulnerabilities Assessment and Recommendation Document

Learning Demonstration: Vulnerabilities Assessment and Recommendation Document

You will provide a detailed vulnerabilities assessment document, along with some specific recommendations to implement to address the vulnerabilities you have described. This document should be based on the scenario provided. Use LabSim as a guide in your analysis and recommendations.

You will submit your document in three major parts:

1. Vulnerabilities Assessment

2. Network System Security Recommendations

3. Application/End-User Security Recommendations

For detailed information on the vulnerabilities assessment document please see Table of Contents > Project Instructions > Vulnerabilities Assessment and Recommendation Document (Parts 1-3)

You will complete the “CompTIA Security+ Certification Practice Exam” as part of your grade. The practice exam is located in Labsim.

Network Security AssessmentPrepared for:University of Maryland University CollegePrepared by:Student Name
Background image of page 1
I. Vulnerability AssessmentsUse this secTon to describe any network security vulnerabiliTes. Use the scenario along with industrystandards and best pracTces to idenTfy the vulnerabiliTes. Describe why it is vulnerable and what theimplicaTon is if it is not miTgated.±he example below is of the physical security of a warehouse. (In your submission, you will have severalvulnerabiliTes idenTFed and miTgated.)At the Alpha Warehouse, we discovered one key vulnerability to the physical security. This was the use ofa Master Lock combina±on lock to secure the back entrance. While the use of a combina±on lock canlimit the number of people who can enter to those given the combina±on, vulnerability in the design ofthese locks was recently exposed. By using “a process that requires less than two minutes and a minimalamount of skill to carry out” [1], would-be thieves can access the warehouse through a single entrance.While the thief will need to also have access to an online calculator that helps stream the process, theprevalence of smartphones makes this a small hurdle to jump, allowing any interested par±es quickaccess to the Alpha Warehouse.
Background image of page 2

Show 

 
Looking for a Similar Assignment? Order now and Get 10% Discount! Use Coupon Code "Newclient"