logo

Information Assurance Report 2022

6 Pages1033 Words20 Views
   

Added on  2022-10-11

Information Assurance Report 2022

   Added on 2022-10-11

ShareRelated Documents
Running head: REPORT ON INFORMATION ASSURANCE
REPORT ON INFORMATION ASSURANCE
Name of the Student:
Name of the University:
Author Note:
Information  Assurance  Report  2022_1
REPORT ON INFORMATION ASSURANCE1
Table of Contents
Discussion..................................................................................................................................2
References..................................................................................................................................5
Information  Assurance  Report  2022_2
REPORT ON INFORMATION ASSURANCE2
Discussion
Internal network and external networks of Department of Defence suppliers within
U.S. Navy is not secured. These networks need to be secured by acquisition department.
Insecure network means data breach can occur anytime. Many threats are faced for an
insecure networks within the navy. Data integrity can be lost with insecure networks. Top
secret information of U.S. Navy can be leaked through this data breach. All information
related to navy like details of every members of the navy and all other stuffs can be leaked
through data breach. Privacy of all details of the navy can be at risk. Data needs to be
protected with a secured network in the navy or else security breach can occur.
The vulnerabilities may de defines one kind of attack surface that are mainly
performed by the attacker in the network system to exploit the overall network system. It
relates the type of network design as well as the implementation of the network, construction,
operation and also the maintenance of the overall network system that will effect on the
overall system security policies as well as the management of the whole network system.
The vulnerabilities of the network design are such as –
Hardware Vulnerability: The hardware vulnerability refers to the flaws that are related to
the hardware issues of the network system such as extreme amount of humidity, dust as well
as the storing of hardware without protection.
Software Vulnerability: The software vulnerability refers to the flaws inside the designing
technique of the networking system including the wrong testing as well as lack of audit of the
assets in time based which helps to lead the software vulnerability.
Information  Assurance  Report  2022_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
(PDF) Control of Distributed Systems: Tutorial and Overview
|7
|1025
|55

Cyber Security Applied Research 2022
|8
|2211
|24

(Doc) Assignment on IT Privacy
|13
|3299
|24

Host and Network Security
|19
|4301
|362

Investigating Network Security
|20
|5617
|397

CYBER SECURITY.
|9
|373
|51