Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Identify strategies to control and monitor the end-user policy violations and se

ID: 3713136 • Letter: I

Question

Identify strategies to control and monitor the end-user policy violations and security breaches listed below to mitigate risk and minimize exposure: " A user made unauthorized use of network resources by attacking network entities. -Open network drive shares allow storage privileges to outside users. - Sensitive laptop data is unencrypted and susceptible to physical theft. "Remote users do not have recent patches or current updates. * Legitimate traffic bearing a malicious payload exploits network services. An invalid protocol header disrupts a critical network service. " Removable storage drives introduce malware filtered only when crossing the network. Predictable passwords meet minimum length requirements but remain easily guessable. -Bad router permissions allow attackers to modify configurations or disrupt traffic.

Explanation / Answer

Solution:

The points which will violate the end-user policies are listed below:

I hope this helps if you find any problem. Please comment below. Don't forget to give a thumbs up if you liked it. :)