Assignment Content
Consider yourself a network security specialist. As you try to secure the security posture of your environment, you realize that different threats can interfere with the confidentiality, integrity, and availability of data-at-rest, data-in-transit, and processing. Some threats may affect only 1 of these elements of security (such as confidentiality only), and other threats affect more than one or even all these elements.
In this assignment, you will be evaluated on your asset protection skill.
Create a 1- to 2-page table in Microsoft® Word identifying a minimum of 6 threats, using the column headers and details below:
Column Headers
Threat
Threat to Type of Data
Confidentiality/Integrity/Availability
Mitigation Suggestion
Details Within Your Table
Identify relevant threats. List 1 per row.
Determine the type of data threatened (data-at-rest, data-in-transit, or processing) for that threat.
Determine if confidentiality, integrity, or availability was affected. Use the labels C, I, and/or A.
Describe the mitigation plan in 2 to 3 sentences in the column.
Include a paragraph that highlights 2 access control techniques that enforce security.
Many students confuse Threats with Vulnerabilities and Risks and there is a distinct difference between them. Review the article below to ensure you understand the difference between them as this assignment is asking specifically for threats.
Link to Threats vs Vulnerabilities and Risks
Cite at least 2 resources to support your assignment.
Format your assignment according to APA guidelines.