100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Otro

WGU C844 Emerging Technologies in Cybersecurity Task 2 |Latest Update with Complete Solution

Puntuación
-
Vendido
-
Páginas
7
Subido en
12-05-2025
Escrito en
2024/2025

WGU C844 Emerging Technologies in Cybersecurity Task 2 |Latest Update with Complete Solution

Institución
Grado

Vista previa del contenido

Task 2 – Alliah Security Plan

WGU C844 Emerging Technologies in Cybersecurity Task 2
|Latest Update with Complete Solution

Jacob Tessers

Professor Stauber

C844 – Emerging Technologies in Cybersecurity

May 5, 2025



Dear Alliah management,



As you know, I have been tasked to shine a spotlight on vulnerabilities pertaining to our WLAN and

mobile devices I have uncovered through my investigation process. While these vulnerabilities can be

concerning, I will include several mitigation recommendations as well as prevention methodologies. It

will be important to implement these fixes before going public to mitigate potential risks in the future.


I. Endpoint Attacks


In regards to WLAN connections, there are two major vulnerabilities the IT team is currently

concerned with, the first being Endpoint Attacks. These attacks include “end users”, which means that

any person connecting to the servers is a potential risk factor. Employees using laptops or mobile

devices, clients accessing the app or website with affected software or devices, as well as internet access

points. These endpoints are doorways to both corporate and personal data. Data breaches are

extremely costly, with an average pricetag of $9.05 million for US companies.


As we look at mitigation techniques to prevent these endpoint attack, there are several steps we

can implement to ensure we are secure. These steps include implementing policies that can be enforced

on a company-wide basis. To best mitigate the risk of endpoint attacks, we should educate users with

regular security, compliance, and alerts, track devices that connect to our network, and implement a

policy of least privilege, which means that employees only have access to company resources that are

essential for their roles (Microsoft Security).

, Task 2 – Alliah Security Plan


II. DDOS Attacks


The second WLAN vulnerability we need to address is the potential of Distributed Denial of

Service attacks. These attacks usually occur due to a trojan virus infecting systems and from there,

packets of data are sent rapidly to servers from multiple locations and at the same time. This causes a

complete service outage for both the website and the application. Ransonware is often packaged within

the virus and these attacks may not end until a ransom is paid. Each DDoS attack costs as much as $218k

without factoring in ransomware costs (Newman).


As it pertains to mitigation of DDOS attacks, it is extremely important that these attacks are

identified quickly. Certain technologies or services can be implemented to alert the system when heavy

traffic is coming into the servers and applications. Additionally, the firewall and router configuration

should be investigated to ensure false traffic is rejected (GeeksforGeeks). As a final note on DDOS attack

mitigation, one of the most simple steps, yet likely the most important, is to ensure all devices and

softwares that Alliyah utilizes are updated completely and often.


III. Lost/Stolen Devices


Moving on to mobile devices, two additional vulnerabilities need to be addressed. First, with the

risk of lost devices. With remote or hybrid caregivers, especially with access to services from cellular

devices, the risk that devices are lost or stolen is high. If these devices are not properly protected,

company data can be altered, stolen, or deleted.


When we utilize remote employees, the risk that devices are lost or stolen will always be there.

For this reason, we should adopt a remote lock and mobile wipe software. Once an employee reports

that their device is missing, those with the access can start wit a remote lock of the lost/stolen device.

This allows the time for the reporting employee to investigate whether the physical device can be

Escuela, estudio y materia

Institución
Grado

Información del documento

Subido en
12 de mayo de 2025
Número de páginas
7
Escrito en
2024/2025
Tipo
Otro
Personaje
Desconocido

Temas

$17.89
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
professoraxel Havard School
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
2396
Miembro desde
3 año
Número de seguidores
1572
Documentos
19455
Última venta
15 horas hace
THE EASIEST WAY TO STUDY NURSING EXAMS,STUDY GUIDES,TESTBANKS AND QUALITY EXAMS

Better grades start here! Find Study Notes, Exam answer packs, Assignment guided solutions and more. Study faster & better. Always leave a review after purchasing any document so as to make sure our customers are 100% satisfied.....All the Best!!!!!!

3.8

457 reseñas

5
214
4
80
3
86
2
26
1
51

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes