Question

In: Computer Science

What will you review and assess within the Workstation Domain as part of this security assessment?

What will you review and assess within the Workstation Domain as part of this security assessment?

Solutions

Expert Solution

Security Assessment is the periodic exercise that tests your organization's security preparedness.it includes a check for also flaws or vulnerabilities in your IT systems and business processes as well as recommending steps like how to lower the risk if anything happens in the future. It is very important in order to maintain the system up to date.

Its the process which can be conducted internally by the IT team or any third party assessor.

A security assessment will help you to identify risk in behaviors of employees and take actions to better train them. Here are a few important reasons that you should be conducting regular security assessments for the betterment :

1. Today most of the companies are using cloud which is considered to be open to everyone.according to the Gartner research by 2020 95 percent data of every company will be available on cloud which will be access by user unnoticeably which is why a security assessment has to be taken for making it sure that it is not been hacked. So a separate core assessment team has to be created. This will be responsible for leading the assessment, preparing the report, and suggest recommendations.

2.The policies which are already existing it has to check. Your security policy will be covering your security strategies, data backup plans, password management policies, security update/patch timelines, and many other details included and if you don't have one it is the right time to design one.

3. Prepare one comprehensive list of all it assets that are being used in the company. This will include all the software, hardware, networks, servers, desktops, laptops, software applications.so the company will be having a note of what is being used.

4. Understanding the threats and vulnerabilities and prepare a list of it and all those issues also which is being faced previously.so in the case of any problem or attack we can cross-check with the list and rectify that problem easily.

5. A plan has to be designed to list the existing control system in place and outline further action which will be helpful to mitigate the identified risks.These controls include changing in procedures, training content or any configuration.


Related Solutions

What will you review and assess within the LAN-to-WAN Domain as part of this security assessment?
What will you review and assess within the LAN-to-WAN Domain as part of this security assessment?
What will you review and assess in the User Domain as part of this security assessment?
What will you review and assess in the User Domain as part of this security assessment?
What will you review within the System/Applications Domain as part of your security assessment?
What will you review within the System/Applications Domain as part of your security assessment?
Workstation security can be an issue in many organizations. What are some of the things a...
Workstation security can be an issue in many organizations. What are some of the things a health care organization can do to secure a workstation to ensure no PHI is viewed by someone who is not authorized to view it?
Part 2: Software security: (7 marks) Assume you are performing preliminary security risk assessment. 1. The...
Part 2: Software security: Assume you are performing preliminary security risk assessment. 1. The first step in performing a preliminary risk assessment is asset identification. List down three assets you identify in an in-store automated supermarket shopping system when conducting the preliminary risk assessment. 2. Identify two possible security risks associated with an in-store supermarket shopping system and propose a system requirement that might reduce each of those risks.
What is the primary goal of the vulnerability assessment and remediation domain of the maintenance model?
What is the primary goal of the vulnerability assessment and remediation domain of the maintenance model? Is this important to an organization with an Internet presence? Why?
What is a network security assessment? The process of judging a security solution The process of...
What is a network security assessment? The process of judging a security solution The process of testing a security solution The process of evaluating a deployed security solution All of these are correct
what assessment is done in a ventilator ? assess the ventilator for leaks - describe the...
what assessment is done in a ventilator ? assess the ventilator for leaks - describe the graphics , types of alarms and how is fixed. Explain potential sites for leaks
Develop a process to assess the security posture of the service provider. What security requirements should...
Develop a process to assess the security posture of the service provider. What security requirements should your organization have? Define security requirements in a cloud-based environment that should be part of your standard.
What are the five steps when carrying out to workplace Risk Assessment? How do you assess...
What are the five steps when carrying out to workplace Risk Assessment? How do you assess the risk assessment related to the health and safety point of view
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT