thorough asset inventory, assign monetary values to each asset (quantitative), and assign a priority
value for each asset (qualitative) that could be used to determine which assets are most critical for
restoral in the event of a catastrophic event or attack.
vulnerabilities and make suggestions for improvements to perimeter and network security.
improvements to mitigate risks to remote access.
(smart phones, tablets, laptops, etc.) in terms of authentication technologies and data protection.
network security to protect data should be implemented.
remote access environments and suggest improvements to secure authentication for AFI.
secure protocol improvements to improve security for web authentication.
rest, in motion and in process.
and qualitative risk assessment of the AFI network.
inventory. Feel free to redesign the corporate infrastructure and use any combination of
technologies to harden the authentication processes and network security measures.