Security Concerns and Mitigation Strategies

Identify a networked technology you use at home, at work, or as a personal convenience. Research and identify three potential threats to endpoint security of the device, and detail a mitigation mechanism for each threat. Also explain why your mitigation strategies would work. Submit the report to your instructor.

Networked Technology:

 

Potential Threat 1:

 

Mitigation Mechanism:

 

Explanation:

 

Potential Threat 2:

 

Mitigation Mechanism:

 

Explanation:

 

Potential Threat 3:

 

Mitigation Mechanism:

 

Explanation:

 

 

Field of study: 

Answer

Unit 8 Assignment 1 Security Concerns and Mitigation Strategies

Buy this answer to view and download it immediately
Money Back Guarantee