https://github.com/compcode1/security-risk-assessment-report-1
By implementing MFA, strong password policies, and rigorous firewall maintenance with port filtering, the organization can address current vulnerabilities and prevent future data breaches.
https://github.com/compcode1/security-risk-assessment-report-1
Last synced: about 1 year ago
JSON representation
By implementing MFA, strong password policies, and rigorous firewall maintenance with port filtering, the organization can address current vulnerabilities and prevent future data breaches.
- Host: GitHub
- URL: https://github.com/compcode1/security-risk-assessment-report-1
- Owner: Compcode1
- License: gpl-3.0
- Created: 2024-11-21T17:06:40.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2024-11-21T17:11:46.000Z (over 1 year ago)
- Last Synced: 2024-11-21T18:22:52.890Z (over 1 year ago)
- Language: Jupyter Notebook
- Size: 22.5 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
- Security: security_risk_report.ipynb
Awesome Lists containing this project
README
I am a security analyst working for a social media organization. The organization recently experienced a major data breach, which compromised the safety of their customers’ personal information, such as names and addresses. My organization wants to implement strong network hardening practices that can be performed consistently to prevent attacks and breaches in the future.
After inspecting the organization’s network, I discover four major vulnerabilities. The four vulnerabilities are as follows:
1. The organization’s employees' share passwords.
2. The admin password for the database is set to the default.
3. The firewalls do not have rules in place to filter traffic coming in and out of the network.
4. Multifactor authentication (MFA) is not used.
If no action is taken to address these vulnerabilities, the organization is at risk of experiencing another data breach or other attacks in the future.
In this activity, you will write a security risk assessment to analyze the incident and explain what methods can be used to further secure the network.