Research Paper Easy-Assess probability of compromise and its impact on each system within the environment.
Evaluate current perimeter security protection and enterprise topology.
Evaluate current remote access to enterprise.
· List identified vulnerabilities and correlate them to SP800-53 rev. 4 (AU, IA, SC and AC Control families) 4 per person in your group
· Assess probability of compromise and its impact on each system within the environment.
· Assess vulnerabilities on each asset and impacts if compromised.
· Recommended mitigation procedures commensurate with identified.
· Formulate a quantitative or qualitative risk assessment for current and then after mitigations have been identified.
· Conclusion