Business > CASE STUDY > IT3358 Week 3 Physical Security done.docx Security Strategy IT3358 Week 3 Physical Netw (All)
IT3358 Week 3 Physical Security done.docx Security Strategy IT3358 Week 3 Physical Network Security Strategy Capella University Abstract As IT professionals one of our main priorities is to prot... ect our data. Having a strict and strong network security strategy is imperative to our company™s existence and success. As technology gets more advanced, we must make sure that we are taking the proper precaution and following procedure to protect our assets. œ55 percent of all attacks are carried out by malicious insiders or inadvertent actors, also known as insider threats. (Bradley, 2021) With this information, we must take the necessary step to enhancing our physical security internally to combat threats internally as well as externally. In this document, we will identify threats and vulnerabilities associated to physical security, define multiple strategies for protecting our company™s data, and identifying policies in which we plan to put into place. Physical Network Security Strategy Describe at least three (3) threats and vulnerabilities associated to physical security. On our journey to providing safety for our data, we must identify what we are up against. As IT professionals we are asked to identify potential threats and vulnerabilities within our system and provide the necessary solutions for them. To start, we will identify these threats and vulnerabilities and give brief descriptions of each. One threat we must look out for internally is sabotage. This threat is usually cause by a disgruntled employee o. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . .. .. . . . . . . . . . . . . . . . . . .. . . . . [Show More]
Last updated: 1 year ago
Preview 1 out of 4 pages
Connected school, study & course
About the document
Uploaded On
Aug 08, 2022
Number of pages
4
Written in
This document has been written for:
Uploaded
Aug 08, 2022
Downloads
0
Views
26
In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Browsegrades · High quality services·