Threat and How Is It Essay

Total Length: 768 words ( 3 double-spaced pages)

Total Sources: 2

Page 1 of 3

Physical vulnerabilities, such as users who leave their systems running while still logged in can also create security concerns, even in the case of a secure system. While systems should have automatic log-outs after a specific period of time, it is impossible for a system to be totally secure if it is being used by an employee who does not follow proper security protocols.

Question 4: Identify five (5) important documentation types necessary for the assessment and explain why they are important.

Network-based testing tests "components of application vulnerability assessment, host vulnerability assessment, and security best practices" ("Security assessment questionnaire," CMU, 2011). It is used to "assess the ease with which any outsider could exploit publicly available information or social engineering to gain unauthorized access" from the internet or intranet due to weak encryption, authentication, and other vulnerabilities ("Security assessment questionnaire," CMU, 2011).

Host-based assessment evaluates the "the health and security of given workstation or server" ("Security assessment questionnaire," CMU, 2011). It assesses if security controls like anti-virus software are up-to-date and indentifies if unnecessary services are running.
It also assesses how up-to-date and vulnerable security controls may be on a workstation; just like network testing does on a general level. Application assessment assesses the "functionality and resilience of the compiled application to known threats," focusing on "compiled and installed elements of the entire system: how the application components are deployed, communicate or otherwise interact with both the user and server environments" to determine if new applications might be superior to those used at present given the potential exposure of servers and the network ("Security assessment questionnaire," CMU, 2011). Compliance assessment audits systems for compliance with federal regulations such as HIPAA, FERPA, GLBA, and PCI. Physical security assessment interviews staff to ensure that they are knowledgeable in correct procedures (such as logging out when stepping away from a computer) and determines if all systems are physically secure and safe from human and environmental threats ("Security assessment questionnaire," CMU, 2011).

Works.....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Threat And How Is It" (2011, November 01) Retrieved May 21, 2025, from
https://www.aceyourpaper.com/essays/threat-47026

Latest MLA Format (8th edition)

Copy Reference
"Threat And How Is It" 01 November 2011. Web.21 May. 2025. <
https://www.aceyourpaper.com/essays/threat-47026>

Latest Chicago Format (16th edition)

Copy Reference
"Threat And How Is It", 01 November 2011, Accessed.21 May. 2025,
https://www.aceyourpaper.com/essays/threat-47026