An Analysis of the Scope and Approach of a Threat Assessment (5602 words, 9 pages)
Scope and Approach of Threat Assessment4EFIS Critical Concerns4Executive Overview5EFIS High Risk Threats by Category6Software Installation and Maintenance7Authorized Users7Outsider Attacks8Physical Threats8General Threat Background8Potential Attackers and Avenues of Attack9EFIS Specific Vulnerabilities11Asset Management Vulnerabilities12Customer Support Help Desk Vulnerabilities12Legacy System Access Vulnerabilities13E-mail Vulnerabilities13Network Vulnerabilities14Physical Security Vulnerabilities15Certifiers Recommendation15References16Appendix171.PHE and HTI Analysis172.EFIS Information Protection Policy (IPP)193.Information ...
Read More