Submit Search
Upload
Risk assesment IT Security project
•
Download as ODP, PDF
•
2 likes
•
557 views
Stefan Fodor
Follow
Risk ass
Read less
Read more
Technology
Report
Share
Report
Share
1 of 18
Download now
Recommended
9.0 security (2)
9.0 security (2)
Frank Victory
Fingerprinting healthcare institutions
Fingerprinting healthcare institutions
securityxploded
Final mojor project risk assesment
Final mojor project risk assesment
conornorton
Psico
Psico
Karem Nuñez
Common digital project risks
Common digital project risks
Richard Adams
Ipma2010 Presentation Omer Ertekin
Ipma2010 Presentation Omer Ertekin
Ömer Ertekin
pfSense presentation
pfSense presentation
Simon Vass
Risk Management for digital projects
Risk Management for digital projects
Reactive, part of Accenture Interactive
Recommended
9.0 security (2)
9.0 security (2)
Frank Victory
Fingerprinting healthcare institutions
Fingerprinting healthcare institutions
securityxploded
Final mojor project risk assesment
Final mojor project risk assesment
conornorton
Psico
Psico
Karem Nuñez
Common digital project risks
Common digital project risks
Richard Adams
Ipma2010 Presentation Omer Ertekin
Ipma2010 Presentation Omer Ertekin
Ömer Ertekin
pfSense presentation
pfSense presentation
Simon Vass
Risk Management for digital projects
Risk Management for digital projects
Reactive, part of Accenture Interactive
Threat management lifecycle in ottica GDPR
Threat management lifecycle in ottica GDPR
Jürgen Ambrosi
Windows Live Forensics 101
Windows Live Forensics 101
Arpan Raval
Anton Chuvakin on Discovering That Your Linux Box is Hacked
Anton Chuvakin on Discovering That Your Linux Box is Hacked
Anton Chuvakin
Windows network security
Windows network security
Information Technology
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Vinod Kumar
Final presentation of IT security project
Final presentation of IT security project
Armandas Rokas
Ids 009 network attacks
Ids 009 network attacks
jyoti_lakhani
Computer Systems Security
Computer Systems Security
drkelleher
Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01
Miigaa Mine
pdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdf
pdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdf
tehkotak4
Seucrity in a nutshell
Seucrity in a nutshell
Yahia Kandeel
Penetration testing, What’s this?
Penetration testing, What’s this?
Dmitry Evteev
InsiderThreat-2016NDITS
InsiderThreat-2016NDITS
Mike Saunders
Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)
Dan Morrill
Reconnaissance - For pentesting and user awareness
Reconnaissance - For pentesting and user awareness
Leon Teale
SplunkLive! London - Scoping Infections and Disrupting Breaches breakout
SplunkLive! London - Scoping Infections and Disrupting Breaches breakout
Splunk
PHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On Lab
Teymur Kheirkhabarov
How to protect your corporate from advanced attacks
How to protect your corporate from advanced attacks
Microsoft
Securing Open Source Databases
Securing Open Source Databases
Gazzang
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security Perimeters
Somyos U.
Coding Gateway - Exam Stefan
Coding Gateway - Exam Stefan
Stefan Fodor
Collaboration Tools and Methods in Software Development
Collaboration Tools and Methods in Software Development
Stefan Fodor
More Related Content
Similar to Risk assesment IT Security project
Threat management lifecycle in ottica GDPR
Threat management lifecycle in ottica GDPR
Jürgen Ambrosi
Windows Live Forensics 101
Windows Live Forensics 101
Arpan Raval
Anton Chuvakin on Discovering That Your Linux Box is Hacked
Anton Chuvakin on Discovering That Your Linux Box is Hacked
Anton Chuvakin
Windows network security
Windows network security
Information Technology
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Vinod Kumar
Final presentation of IT security project
Final presentation of IT security project
Armandas Rokas
Ids 009 network attacks
Ids 009 network attacks
jyoti_lakhani
Computer Systems Security
Computer Systems Security
drkelleher
Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01
Miigaa Mine
pdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdf
pdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdf
tehkotak4
Seucrity in a nutshell
Seucrity in a nutshell
Yahia Kandeel
Penetration testing, What’s this?
Penetration testing, What’s this?
Dmitry Evteev
InsiderThreat-2016NDITS
InsiderThreat-2016NDITS
Mike Saunders
Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)
Dan Morrill
Reconnaissance - For pentesting and user awareness
Reconnaissance - For pentesting and user awareness
Leon Teale
SplunkLive! London - Scoping Infections and Disrupting Breaches breakout
SplunkLive! London - Scoping Infections and Disrupting Breaches breakout
Splunk
PHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On Lab
Teymur Kheirkhabarov
How to protect your corporate from advanced attacks
How to protect your corporate from advanced attacks
Microsoft
Securing Open Source Databases
Securing Open Source Databases
Gazzang
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security Perimeters
Somyos U.
Similar to Risk assesment IT Security project
(20)
Threat management lifecycle in ottica GDPR
Threat management lifecycle in ottica GDPR
Windows Live Forensics 101
Windows Live Forensics 101
Anton Chuvakin on Discovering That Your Linux Box is Hacked
Anton Chuvakin on Discovering That Your Linux Box is Hacked
Windows network security
Windows network security
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Final presentation of IT security project
Final presentation of IT security project
Ids 009 network attacks
Ids 009 network attacks
Computer Systems Security
Computer Systems Security
Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01
pdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdf
pdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdf
Seucrity in a nutshell
Seucrity in a nutshell
Penetration testing, What’s this?
Penetration testing, What’s this?
InsiderThreat-2016NDITS
InsiderThreat-2016NDITS
Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)
Reconnaissance - For pentesting and user awareness
Reconnaissance - For pentesting and user awareness
SplunkLive! London - Scoping Infections and Disrupting Breaches breakout
SplunkLive! London - Scoping Infections and Disrupting Breaches breakout
PHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On Lab
How to protect your corporate from advanced attacks
How to protect your corporate from advanced attacks
Securing Open Source Databases
Securing Open Source Databases
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security Perimeters
More from Stefan Fodor
Coding Gateway - Exam Stefan
Coding Gateway - Exam Stefan
Stefan Fodor
Collaboration Tools and Methods in Software Development
Collaboration Tools and Methods in Software Development
Stefan Fodor
PacMan Rebourn
PacMan Rebourn
Stefan Fodor
Attack of the BEAST
Attack of the BEAST
Stefan Fodor
It Security Project
It Security Project
Stefan Fodor
Squash that Bug!
Squash that Bug!
Stefan Fodor
Protocols for Embedded Node
Protocols for Embedded Node
Stefan Fodor
Qualys Threads
Qualys Threads
Stefan Fodor
2FLogin
2FLogin
Stefan Fodor
Lillebaelt Academy - ro
Lillebaelt Academy - ro
Stefan Fodor
Ruby on Rails 3
Ruby on Rails 3
Stefan Fodor
Side channel attacks
Side channel attacks
Stefan Fodor
Special Subject 1+2: RoR 2
Special Subject 1+2: RoR 2
Stefan Fodor
dry_run_exam
dry_run_exam
Stefan Fodor
Facebook
Facebook
Stefan Fodor
Logs
Logs
Stefan Fodor
Reconnaissance software
Reconnaissance software
Stefan Fodor
Special Subject 1+2: RoR 1
Special Subject 1+2: RoR 1
Stefan Fodor
Network proj 1.1
Network proj 1.1
Stefan Fodor
Network telnet ssh
Network telnet ssh
Stefan Fodor
More from Stefan Fodor
(20)
Coding Gateway - Exam Stefan
Coding Gateway - Exam Stefan
Collaboration Tools and Methods in Software Development
Collaboration Tools and Methods in Software Development
PacMan Rebourn
PacMan Rebourn
Attack of the BEAST
Attack of the BEAST
It Security Project
It Security Project
Squash that Bug!
Squash that Bug!
Protocols for Embedded Node
Protocols for Embedded Node
Qualys Threads
Qualys Threads
2FLogin
2FLogin
Lillebaelt Academy - ro
Lillebaelt Academy - ro
Ruby on Rails 3
Ruby on Rails 3
Side channel attacks
Side channel attacks
Special Subject 1+2: RoR 2
Special Subject 1+2: RoR 2
dry_run_exam
dry_run_exam
Facebook
Facebook
Logs
Logs
Reconnaissance software
Reconnaissance software
Special Subject 1+2: RoR 1
Special Subject 1+2: RoR 1
Network proj 1.1
Network proj 1.1
Network telnet ssh
Network telnet ssh
Recently uploaded
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
Elevate Developer Efficiency & build GenAI Application with Amazon Q
Elevate Developer Efficiency & build GenAI Application with Amazon Q
Bhuvaneswari Subramani
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
MIND CTI
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
WSO2
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
sammart93
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
apidays
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
johnbeverley2021
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
MadyBayot
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
UiPathCommunity
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Jeffrey Haguewood
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
Remote DBA Services
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Zilliz
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Deepika Singh
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
Dropbox
Recently uploaded
(20)
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Elevate Developer Efficiency & build GenAI Application with Amazon Q
Elevate Developer Efficiency & build GenAI Application with Amazon Q
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
Risk assesment IT Security project
1.
2.
3.
4.
Recommendations
5.
Resulted Documentation
6.
7.
8.
9.
10.
Office/Lab LAN
: 172.16.2.0/24
11.
VPN connection to
Headquarter
12.
One pfSense as
router, gateway and firewall
13.
14.
Web Server
15.
Database Server
16.
17.
18.
19.
Firefox web browser
20.
Thunderbird Mail Client
21.
Office Suite
22.
23.
CD-ROM
24.
4 x USB
port
25.
26.
(DVL OS for
Web Server)
27.
Specific Server Daemon
Running
28.
29.
CD-ROM
30.
4 x USB
port
31.
32.
Confidential organization files
33.
Work files
34.
35.
Mail
36.
Workstations
37.
Classified activities
38.
39.
Confidential organization files
EH
40.
Work files
M
41.
42.
Confidential organization files
H
43.
Work files
M
44.
45.
46.
Social Engineering
47.
48.
Information Theft
49.
Social Engineering
50.
51.
Physical damage
52.
53.
54.
DoS
55.
System failures
56.
57.
58.
DoS FTP server
used as “file server” Users, Hackers, Secret Agents Access to sensitive information Data tempering Oudates and unpatched software Malicious users System crash DoS System failures Remote Access Vulnerability Identification
59.
60.
61.
62.
63.
64.
65.
Download now