g
The fault-finding investigation will focus on the following areas: -
Network Security Issues: Identifying unauthorized access points and weak configurations. -
User Access Control: Reviewing login logs for unusual activity. -
Endpoint Protection: Ensuring that all devices are secured against malware. -
Phishing and Social Engineering Risks: Analysing email security configurations. -
System Updates and Patch Management: Checking for unpatched vulnerabilities. -
Incident Response and Recovery: Evaluating existing security measures.
Fault-Finding Investigation
Identified Security Vulnerabilities
Weak Authentication Mechanisms: Multiple accounts using default or weak passwords.
Misconfigured Firewalls: Open ports allowing unauthorized external connections.
Unpatched Software: Outdated operating systems and software increasing the attack surface.
Insider Threats: Employees accessing restricted data without proper authorization.
Unsecured Wireless Network: Lack of encryption in Wi-Fi settings.
Exposed APIs and Web Services: Lack of proper access control measures.
Potential Cyber Threats
The identified vulnerabilities expose the system to various cyber threats, including: -
Brute Force Attacks: Exploiting weak passwords for unauthorized access. -
Phishing and Social Engineering Attacks: Employees targeted through malicious emails.
Ransomware Attacks: Unpatched systems susceptible to malware infections. -
Denial-of-Service (DoS) Attacks: Attackers exploiting open ports to overload systems. -
Man-in-the-Middle Attacks
Unsecured network traffic interception.
Insider Threats: Misuse of privileged accounts leading to data breaches.
Recommended Mitigation Strategies
To strengthen the security posture, the following mitigation measures are recommended:
Implement Strong Password Policies: Require complex passwords and enable multi-factor authentication. -
Regular Patch Management: Automate updates to ensure all systems remain protected. -
Firewall Configuration Best Practices
Restrict open ports and enforce network segmentation. -
Security Awareness Training
Educate employees on phishing attacks and insider threats. -Data Encryption Measures
Encrypt sensitive data in transit and at rest.
Conduct Periodic Security Audit: Regularly assess the network for new vulnerabilities.
NON TECHNICAL THREATS
Human Error
Malicious Employees
Disguised Criminals
Natural Disasters
![]() |
| TECHNICAL Threats |


Comments
Post a Comment