The case study company provided a situation in which threats pose a real risk to the infrastructure. The company assets are not well-protected, and they all share a common network. Little additional security mechanisms are in place other than the demilitarized zone (DMZ). What are typical information security (IS) assets that are used by such a company, and what risks exist in the current model? What will adding a flexible solution for the consultants to connect to the network do to this risk model? What are some safeguards that can be implemented to reduce the risk?

Week 2: Security Assessment

A description of typical assets

A discussion about the current risks in the organization with no network segregation to each of the assets

A discussion about specific risks that the new consultant network will create

Details on how you will test for risk and conduct a security assessment

A discussion on risk mitigation

We can handle this paper for you

We Guarantee ZERO Plagiarism ZERO AI

Done by Professional writers from scratch


Leave a Reply

Your email address will not be published. Required fields are marked *