System Threats Table
The following table is in continuation of last week’s memo about system dangers for Kudler Fine Foods. Table 1 explains exactly what the particular danger is for the vulnerability which was mentioned in the memo. The table doesn't identify any type of corrective measures which may be required. In future messages the right measures will be discussed, because it is not part of the existing measure.
Area of System Employee authentication
Threat Illegal users can access
Potential Vulnerability There could be wrong
the system.
information which is geared at rewarding undeserving customers. Customer data could be changed by illegal staff
Data access restrictions
Users have illegal access
as well as users. There are presently not
to data.
any limitations set in place for approved users. This makes it so that all the information is accessible by any type of user, that can lead to thieved, edited, erased, and so on, data
Data transmission across
Data may be intercepted,
wrongdoers. Intercepted information
entire network
duplicated, as well as
may be used to get
changed during transit.
additional access to a network's infrastructure, for instance say in case
user approval to the server was intercepted. Refusal of Service techniques may be used to disrupt company works.
PURCHASE THE ANSWER FILE IMMEDIATELY VISIT http://www.fasthomeworkhelp.com