1. Analyze of at least five identification, authentication, and access control methods organizations use to resist possible attacks?
2. Evaluate these methods and discuss how they can make an organization vulnerable to possible attacks?
3. Discuss ways to improve each of these methods to help ensure the organization is safe against possible attacks?
Cyber terrorism is an act of terrorism through internet and it is also an activity done by the terrorists. The term “Cyber terrorism” is a contentious term and according to some authors known terrorists organizations attacks and create panic among the common public as it is their main aim to create error among the public. The terrorism created through the internet is not easily tracked so it becomes more difficult to keep people tension free as there is no accurate news that who released the news of the attacks.
According to (Girard, 2013), Cyber terrorism was well known as cyber crime but Cyber terrorism should be the exact term as with the help of internet the terrorist spreads the news of attacks it becomes very difficult for the organizations to trace that from where and who spread the news and as the person is not traced then people panics that there will be attack and becomes difficult for the police to keep control among the crowd which goes out of control after getting the news (Kumar, & Mittal, 2012).
Asset Identification – Before securing the networks it is mandatory to identify each and every component that is used for making the components. An asset inventory needs to be created which will be including all the devices and end-points of networks and also the servers and the hosts of networks.
Vulnerability Assessment – After identifying the networks the vulnerability can be accessed. The vulnerability also has the weakness in configuration, security policy or technology. The vulnerability that is discovered can be threats and it can take the advantages of these vulnerabilities.
Threat identification-The threats takes the advantages of the vulnerability and creates a disadvantage for the networks. The potential threats of the network need to identify fast so the risk can be minimized (Czosseck, Ottis, & Talihärm, 2013).
Firewalls- Before receiving or sending any data or mails the data will be filtered so that no virus does with the data to anyone. Firewalls help in filtering so that while receiving or sending any data no virus or malware will go or we will receive with those data.
Usage of antivirus- With the usage of antivirus helps in tracking the antivirus and removes them from the systems so that the system does not gets affected and also secure the system from unnecessary threats.
These methods helps the organization in identifying the possible attacks and then authenticate and access the controls so that the possible attacks can be stopped from destroying the system and also resists from spreading the virus or the terrorism all over. After identifying the attacks the organization takes necessary steps so that they can save the organizations and also the systems from the possible attacks which has been coming towards them (Collins, & McCombie, 2012).
With the security designs some types of trade offs are occurring among the security measures and user productivity. The main goals of the security designs are that they provide security to maximum level and the security which they are providing useful impact on the productivity and also on the user access. Along with all this the unnecessary data or after the verification and authorization the organizations can prevent all the unwanted things which can damage the systems so that they can keep the system from unnecessary threats so that the organizations can enhance good productivity of all ethical data without any disturbance of threats (Jewkes, & Yar, Eds 2013).
Productivity tools are used in the networks so that they can design it according to the need to particular business (Jarvis, Nouri, & Whiting, 2015). The security policy they can implement in those networks in such a way so that those security walls safeguards the security of the systems of the organizations. When the security walls will be made some points need to be ensured that the security policy should not know about the operating policy of the organization as if by any means the security policy gets cracked or traced by the hackers or the terrorists groups then all the details of the organizations will go in their hand and then they can use those details against the organizations and also against the government of the country which is not at all acceptable by anyone (Altheide, 2014). So, when the security policies will be made then some things need to be kept in mind and the security models need to be made accordingly. So, the organizations need to update their policies systematically so that no one gets to knows about the operation system of the organization otherwise it will be very risky for the organization and then again they will be under the scrutiny of threats (Holt, 2012).
The design of the security models varies from each other. While making security model three general steps are restrictive, open and closed. So, the important points are while making the security models are-
In the open access the security model can be easily implemented and then security measures are implemented in the designs. But the firewalls, intrusion detection system cannot be easily implemented in the open end security system (Day, 2014).
But in the close security system the security models takes a little time while they are implemented in the systems of the organizations but the firewalls, antivirus are easily implemented in the close system ( Mugabi, & Bishop, 2014). As in the close system no one can easily access so there is less chance of attacking the systems with the threats. Along with that if there is any threat enters into the system then with the help of antivirus those threats can be blocked which will be a great help for the organization as they will be able to protect from threats (Halder, Jaishankar, & Jaishankar, 2012).
Along with all this there is a type of system called “Resistance Assess” which helps the organization and also the system models in resisting the access of the system when there is threat in the system. These systems make the people aware by giving certain types of messages that there are threats in the system and while using the system they should run the firewall and the antivirus which will kill the virus so that the system does not gets affected further. Along with that if the firewalls or the antivirus are not updated then they gives the message to update those software so that they are able to resist the threats (Dawson, & Omar, 2015).
When the organizations are implementing security models in their organization they have to ensure the safety so that the threat does not damage the systems and along with that does not hack the operating the systems of the organization or else it will be a problem for the organization as all the details will be out to the hackers and they can use those details against them (Dawson, 2015). So, after making the security models they need to be updated after every certain time of interval so that the systems can be able to resist the virus and the malwares which have the capabilities of resisting the threats which are coming in their way to damage the systems (Gilmour, 2014). So, the organizations have to keep all the system updated so that they have the capability of resisting all the threats and this will help them in protecting them from all the attacks which will be coming in their way. Along with all this the organizations also need to use those firewalls which will be able to protect the systems from attacks and the employees of the organizations also have to be aware before clicking any links that whether there is any kind of threats or attacks in those links (Taylor, Fritsch, & Liederbach, 2014).
In a nutshell it can be said that now days cyber terrorism is one of the most dangerous threats which has the capability of destroying a lot of things in a system and along with that it creates panic among public then it becomes difficult for the cyber crime police all this. So, it is necessary for all the organizations to take certain measures which will save them and their systems from the different types of threats and attacks which are coming in their way and along with that security models that are using in the in the systems for protecting them need to be updated from time to time so that they are capable to resisting the attacks.
Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2014). Digital crime and digital terrorism. Prentice Hall Press
Dawson, M. (2015). A Brief Review of New Threats and Countermeasures in Digital Crime and Cyber Terrorism.
Dawson, M., & Omar, M. (2015). New Threats and Countermeasures in Digital Crime and Cyber Terrorism
Day, P. (2014). Cyber Attack: The Truth about Digital Crime, Cyber Warfare and Government Snooping. Carlton Books, Ltd
Halder, D., Jaishankar, K., & Jaishankar, K. (2012). Cyber crime and the victimization of women: laws, rights and regulations. Information Science Reference.
Jewkes, Y., & Yar, M. (Eds.). (2013). Handbook of Internet crime. Routledge.
Girard, J. E. (2013). Criminalistics: Forensic science, crime, and terrorism. Jones & Bartlett Publishers
Mugabi, I., & Bishop, J. (2014). The Need for a Dualist Application of Public and Private Law in Great Britain Following the Use of ‘Flame Trolling’During the 2011 UK Riots: A Review and Model. Handbook of Research on New Threats and Countermeasures in Digital Crime and Cyber Terrorism. Hershey, PA: IGI Global.
Holt, T. J. (2012). Exploring the intersections of technology, crime, and terror.Terrorism and Political Violence, 24(2), 337-354.
Collins, S., & McCombie, S. (2012). Stuxnet: the emergence of a new cyber weapon and its implications. Journal of Policing, Intelligence and Counter Terrorism, 7(1), 80-91.
Kumar, P., & Mittal, S. (2012). The perpetration and prevention of cyber crime: an analysis of cyber terrorism in India. International Journal of Technoethics (IJT), 3(1), 43-52.
Jarvis, L., Nouri, L., & Whiting, A. (2015). 11 Terrorism, violence and conflict in the digital age. Researching Terrorism, Peace and Conflict Studies: Interaction, Synthesis and Opposition, 203.
Czosseck, C., Ottis, R., & Talihärm, A. M. (2013). Estonia after the 2007 cyber attacks: Legal, strategic and organisational changes in cyber security. Case Studies in Information Warfare and Security: For Researchers, Teachers and Students, 72.
Gilmour, S. (2014). Policing crime and terrorism in cyberspace: An overview.European Review of Organised Crime, 1(1), 143-159.
Altheide, D. L. (2014). The Triumph of Fear: Connecting the Dots about Whistleblowers and Surveillance. International Journal of Cyber Warfare and Terrorism (IJCWT), 4(1), 1-7.
Getting nightmare regarding pending chemistry assignment? Then it is high time you consider hiring chemistry assignment help service of MyAssigemnthelp.com. We at MyAssignmenthelp.com deliver quality subject specific assistance on more than 100+ subjects. For us, students' need is foremost, and we work round the clock to offer science, humanities and commerce assignment help. Among Commerce wing, our one of the most popular services is capital budgeting assignment help. In science segment, we have gained popularity with biology assignment help.
You are required to write a researched argument essay that convinces persuades the reader of your position / stance. This is an academic, researched and referenced do...Read More
Executive Summary The purpose of this report is to elaborate the factors which are considered by individuals before selecting an occupation. Choosing an occupati...Read More
Introduction With the increase enhancement in the field of technology, it has been considered essential by the businesses to implement such technology in their b...Read More
Executive Summary In a merger & acquisition, role of an HR has emerged as a very critical function. At each stage of merger and acquisition process, HR plays a s...Read More
Introduction In this competitive business environment where every business organization is trying to attract the customers of each other, it becomes essential for ...Read More