Business > CASE STUDY > IT3358 Week 3 Physical Security done.docx Security Strategy IT3358 Week 3 Physical Netw (All)

IT3358 Week 3 Physical Security done.docx Security Strategy IT3358 Week 3 Physical Netw

Document Content and Description Below

IT3358 Week 3 Physical Security done.docx Security Strategy IT3358 Week 3 Physical Network Security Strategy Capella University Abstract As IT professionals one of our main priorities is to prot... ect our data. Having a strict and strong network security strategy is imperative to our company™s existence and success. As technology gets more advanced, we must make sure that we are taking the proper precaution and following procedure to protect our assets. œ55 percent of all attacks are carried out by malicious insiders or inadvertent actors, also known as insider threats. (Bradley, 2021) With this information, we must take the necessary step to enhancing our physical security internally to combat threats internally as well as externally. In this document, we will identify threats and vulnerabilities associated to physical security, define multiple strategies for protecting our company™s data, and identifying policies in which we plan to put into place. Physical Network Security Strategy Describe at least three (3) threats and vulnerabilities associated to physical security. On our journey to providing safety for our data, we must identify what we are up against. As IT professionals we are asked to identify potential threats and vulnerabilities within our system and provide the necessary solutions for them. To start, we will identify these threats and vulnerabilities and give brief descriptions of each. One threat we must look out for internally is sabotage. This threat is usually cause by a disgruntled employee o. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . .. .. . . . . . . . . . . . . . . . . . .. . . . . [Show More]

Last updated: 1 year ago

Preview 1 out of 4 pages

Reviews( 0 )

$5.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

GET ASSIGNMENT HELP
26
0

Document information


Connected school, study & course


About the document


Uploaded On

Aug 08, 2022

Number of pages

4

Written in

Seller


seller-icon
helperatsof1

Member since 2 years

48 Documents Sold


Additional information

This document has been written for:

Uploaded

Aug 08, 2022

Downloads

 0

Views

 26

Document Keyword Tags

Recommended For You

What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·