logo

Assignment on Cyber Security 2022

   

Added on  2022-09-21

7 Pages712 Words26 Views
Running head: CYBER-SECURITY
CYBER-SECURITY
Name of the Student
Name of the University
Author Note:
Assignment on Cyber Security 2022_1
CYBER-SECURITY1
Orga
nizati
on
Asset
Progra
ms
Hard
ware
Mod
el
Serial
numbe
r for
Device
s
Mod
el
of
devi
ces
Import
ance of
Device
s
Use
of
Devi
ce
Device
Catego
ry
Confid
entialit
y
Inte
grit
y
Avail
abilit
y
Telep
hone
Office
progra
m
(used
for
commu
nicatio
n)
Moto
rola
Fixed
Wirel
ess
Phon
e
SN
196296
FW
200
L
blac
k
Used
for
Comm
unicati
ng
within
the
depart
ment
Hum
an
Reso
urce
Depa
rtme
nt
Comm
unicati
on
device
Low Lo
w
Low
Fax Sendin
g Files
Panas
onic
Fax
Mach
ine
SN
104
KX-
FP7
01
Used
for
sendin
g
import
ant
files
from
one
place
to
another
Hum
an
resou
rce
Depa
rtme
nt
Comm
unicati
on
device
Low Lo
w
Low
Route
r
Wireles
s
networ
k
Device
TP-
Link
AC1
900
Arch
er A9
Smar
t
WiFi,
High
Spee
d
MU-
SN
1104
Arch
er
A9
It
provide
s
wireles
s
internet
connec
tion in
the
Office
for all
the
devices
Infor
matio
n
Tech
nolog
y
Depa
rtme
nt
Comm
unicati
on
device
High Hig
h
High
Assignment on Cyber Security 2022_2
CYBER-SECURITY2
MIM
O
Printe
r
Printin
g
importa
nt
docum
ents
HP
Desk
Jet
SN :
7009
HP
2622
It
accepts
text
input
and
graphic
output
Hum
an
resou
rce
Depa
rtme
nt
Hardw
are
device
Low Lo
w
Low
Firew
all
IT
securit
y
Links
ys
Syste
ms
RV
110
W
Wirel
ess-N
VPN
Firew
all
B004Z
MXE6
6
RV1
10W
-A-
NA-
K9
It
prevent
s the
unauth
orized
to and
from
the
private
networ
k.
Infor
matio
n
Tech
nolog
y
Depa
rtme
nt
Softwa
re
device
Very
High
Ver
y
Hig
h
Very
High
Anti-
virus
Protecti
on to
comput
er
System
Kasp
ersky
Total
Secur
ity
2020
Lates
t
Versi
on
B073V
KKNN
9
Secu
rity
2020
The
main
use of
anti-
virus is
all
about
detecti
ng,
neutrali
zing
some
of the
malwar
e
softwar
e. It
does
not
only
identif
y or
destroy
system
virus
Infor
matio
n
Tech
nolog
y
Depa
rtme
nt
Softwa
re
High Hig
h
High
Assignment on Cyber Security 2022_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security: Analyst, Policy, and Recommendations for Skyward Co
|10
|1963
|53

Social and Cultural Impact of the Use of ICT Associated With Cyber Security | Report
|15
|4018
|9