For the discussion this week you will we discussing vulnerabilities. For your main post you will select two IT Infrastucture domains which are below.
1) User domain
2) Workstation
3) LAN
4) LAN to WAN
5) WAN
6) Remote Access
For each of the domains selected research and report on 2-3 vulnerabilities per domain and what would be a control for each of the vulnerabilities identified. Show your research.
A minimum of two response posts are required.
Using the IT Infrastructure domains and research you did in the discussion prepare a short paper on the vulnerabilities you presented.
That is, If those vulnerabilities should be exploited do they affect Confidentiality, Integrity, and Availability of a system. Explain and support your rational. Paper should be 2-3 pages in length and references also.