Skip to content
Security Policies
Incident Response Plans
Incident Response Plans
Internet disconnection
Network service disconnection
MAC Address Spoofing and Bad IP Release.
Unauthorized System and Network Access.
No backup System
Electrical failure, or power outage for a period.
Can’t manage and secure part of the network, because of existing outdated switches and Infrastructure. In addition to Weak Network Segmentation.
Lack of security documentation
No central updates and patches for the application and software
Insider Threads (Unauthorized access to system – Misuse privilege - Blackmail - Browsing of proprietary information - Computer abuse, corrupted data Malicious code (e.g., virus, logic bomb, Trojan horse) Intrusion on personal privacy
Device malfunction/ Misuse of technical devices.
Lack of Cybersecurity skills and competencies required for cybersecurity technical work.
Lack of Cybersecurity Awareness programs to the Employees, Lecturer and Students.
No Security Information and Event Management (SIEM) to manage and handle the security log
Natural Disaster: Storms, dust and dirt
Natural Disaster: Fire, Floods and Tornadoes.
Human Threats: Theft Of Devices and Storage Media