Cyber security is a concern that is gaining more and more importance within the organizations in today’s world and needs to be addressed on an urgent basis. There are different kind of cybercrimes that take place across the organizations all across the world.
In this report, the different control measures for the different categories of threats will be discussed in details, which will give the reader a clear understanding of the threats and the associated mitigation techniques. By the end of the report, the reader will have an in-depth understanding of the different mitigation techniques as well as the categories of the different kind sof threats that are prevailing in the organizations in todays world.
This is the issue faced by many companies today, wherein the important data gets corrupted accidentally due to different reasons such as malware infection and improper troubleshooting of existing issues within the systems of the organizations. The data is corrupted or copied in multiple locations and are often decrypted causing them unable to be read or opened (Wu and Irwin 2016).
Usage of proper antivirus can be classified as a product based solution for this issue, while regular hardware and software troubleshooting can be classified as physical control measures. These are aimed to prevent any kind of data corruption in the organizational systems and workstations.
Protection of intellectual property is aimed for protection of inventions, artistic as well as literary works such as symbols and images, which are created by the organizations out of creativity.
Usage of patents and trademarks is for preventing the loss of intellectual data, It is classified as administrative in nature. An agreement or SLA is signed in the beginning with the third party organizations so that the third party companies’ to the parent company in case of any misconduct can provide proper compensations. Therefore, it is also an administrative feature.
This is an issue where software’s are illegally pirated or used in other systems by illegal download from the internet in order to avoid the license fees associate to its usage.
The control measures such as usage of license is administrative in nature, which should be incorporated by the system administrators. It helps in checking as well as identifying the authenticity of the software’s being used in the organizations.
The hackers are stealing confidential information of the organizations remotely by bypassing security measures of the organizations. They release Trojan horse, which is a kind of virus as well as phishing frauds into the organizational computers (Mahmood and Afzal 2013).
Network firewall is a product, which helps in preventing attacks from hackers. Audit trails are also a product-based feature, which can help in detecting who accessed what information and from which system in the organization.
Employee vandalism occurs when the employees have a revengeful tendency towards a particular fellow employee or the organization as a whole and purposely wants the data of the organization to be corrupted for his own personal or professional interests.
Both the control measures are administrative in nature, which helps in preventing the acts of employee vandalism within the organizations.
It is a malicious attack that a website can face which will in turn change the appearance of the website. The hackers break into the company servers and replace the appearance of the hosted website with their own.
It is a product-based solution since the monitoring tools are specialized defacement testing products that helps in preventing such an incidence. Response techniques are administrative in nature in order to counter attack such indecencies once they have already occurred.
Flood is a natural calamity that can cause damage to the systems as well as the networks. Fire can cause massive burnouts of the systems and organizational infrastructures.
These control measures have to be carried out physically in order to prevent as well as counter attack the issues.
This issue occurs when data, which is supposed to be accessed by officials of higher privilege, are actually accessed and illegally used by users of lower privilege, within the organization.
The control measures are administrative in nature and both the measures help in preventing users of lower privilege to access data meant for higher officials.
This issue occurs when there are any kinds of threats of any physicals devices such as laptops or other sensitive equipment’s from the workplace that can contain sensitive organizational data.
Classification and type:
These are physical in nature and helps in preventing as well as identifying the thief in case a theft has already occurred within the organization.
Virus infections can cause data theft as well as privacy breach by the hackers.
Classification and type:
This is a product-based solution such as usage of enterprise antivirus programs like Kaspersky internet security, which prevents such virus attacks.
Therefore, it can be concluded that if the organizations have proper knowledge about the mitigation techniques of the data security issues as discussed above, they will be able to prevent all possible security threats. If the organizations can consider these threats at the time of implementing any new technology, it will be able to reach newer heights within their work culture in terms of their data and information security.
Mahmood, T. and Afzal, U., 2013, December. Security analytics: Big data analytics for cybersecurity: A review of trends, techniques and tools. In Information assurance (ncia), 2013 2nd national conference on (pp. 129-134). IEEE.
Wu, C.H.J. and Irwin, J.D., 2016. Introduction to computer networks and cybersecurity. CRC Press.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2020). Computer Networks And Cybersecurity 2. Retrieved from https://myassignmenthelp.com/free-samples/engr8762-computer-networks-and-cybersecurity-2.
"Computer Networks And Cybersecurity 2." My Assignment Help, 2020, https://myassignmenthelp.com/free-samples/engr8762-computer-networks-and-cybersecurity-2.
My Assignment Help (2020) Computer Networks And Cybersecurity 2 [Online]. Available from: https://myassignmenthelp.com/free-samples/engr8762-computer-networks-and-cybersecurity-2
[Accessed 28 February 2020].
My Assignment Help. 'Computer Networks And Cybersecurity 2' (My Assignment Help, 2020) <https://myassignmenthelp.com/free-samples/engr8762-computer-networks-and-cybersecurity-2> accessed 28 February 2020.
My Assignment Help. Computer Networks And Cybersecurity 2 [Internet]. My Assignment Help. 2020 [cited 28 February 2020]. Available from: https://myassignmenthelp.com/free-samples/engr8762-computer-networks-and-cybersecurity-2.
If you are looking for interesting essay topic ideas, we are the best essay writing services. Whether for a narrative piece or a persuasive one, our topics will keep your professor, and other readers intrigued. Our team of experts can also provide you with the best essay writing help if you want to make a quality submission. Apart from suggesting essay topics and writing them for you, we also offer complimentary editing and proofreading services. Call us for more details.
Answer: Introduction: In their general definition, acceptable use policies are written documents stipulating out both the restrictions and practices regarding the usage of organization technology. They describe various activities which employees are allowed and others restricted to do using the organization networks, systems as well as computers. Drawing from that perspective, therefore, an email acceptable use policy can be defined...Read More
Answer: Introduction Smooth and reliable communication is significant for companies to realize economical routine operations. There is need to provide seamless communication between EZY –Books headquarters and the branch offices. A lot of time and resources are wasted in the traditional way of storing information and data. It is quite worth noting that there are higher chances of losing locally stored data. Data and informat...Read More
Answer: Introduction There is a requirement in Excelfior Ltd. To rebuild their current network framework as there are different security issues and outdated hardware devices used. The company is a digital communication company and works in Melbourne for designing managing and hosting the website of the company. The number of departments in the organization should be identified and the developed working in the organization are identified for t...Read More
Answer: Introduction: Cyber security is a concern that is gaining more and more importance within the organizations in today’s world and needs to be addressed on an urgent basis. There are different kind of cybercrimes that take place across the organizations all across the world. In this report, the different control measures for the different categories of threats will be discussed in details, which will give the reader a clear under...Read More
Answer: Introduction The essence of this report is feedback to the manager who wanted a system analyst to shade more light on agile or adaptive software development methodologies. The report discusses adaptive software development and introduces the various methodologies related to it. It further expounds on scrum and extreme programming agile methodology giving a recommendation to Pty Ltd on the methodology that is best suited for the implem...Read More
Just share your requirements and get customized solutions on time.
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
I want to say my sincere gratitude to the person that did my assignment it ready boast my grades this term I hope everyone can follow your example to do a good job not just the money, and you done have a rash, please pay attention to our assignments...
Awesome! This really helped me out. I was unsure of what to do for this assignment and I ended up getting an A
Thank you very much I am happy now I have successfully graduate because of you guys
All things were good, the experts know what they do. I completely recommend students to visit this site.