Risk

Topics: Malware, Computer virus, Trojan horse Pages: 4 (1198 words) Published: March 10, 2013
Running Head: IDENTIFYING POTENTIAL RISK, RESPONSE AND RECOVERY

Assignment 2-Identifying potential risk, response and recovery CIS 333 Section 107 VA016
February 24, 2011

With operating a business, there are good and bad things that can go wrong. There are you can get robbed by outsiders, your employees can steal from you and your business can suffer from lack of profits. All of these situations are horrible, but there are other attacks on your business that you need to be concerned with. These malicious attacks are fair worse because they can go undetected. A malicious attack is an attack on a computer system or network asset succeeds by exploiting vulnerabilities in the system (Kim, 2012). There are many forms of attacks that you should be mindful of. Brute force, dictionary, man-in-the-middle, and masquerade attacks are some of the attacks that can cause harm to your business and your computer network. Hijacking, phishing and spoofing are also harmful.

In a brute force attack, the attacker tries different passwords on a system until one of them works. Often times the attacker uses a software program that tries all of the possible combinations until one is successful. Because computers today are large in scale, it may take loads of time to crack the codes. A dictionary attack, a password-cracker program, banks on users choosing weak passwords. In order to reduce the chance of this happening in your business, I would suggest that you have everyone change their passwords often. When choosing a password, make sure that it has a minimum of 8 characters, is alpha/numeric and include at least one symbol.

Man-in-the-middle attack is another type of attack to be mindful of. This type of attack is a form of eavesdropping. It breaches security by allowing the attacker to intercept messages between two parties and then transfers them to another destination. The secure connection that you think you have is...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Technology and Risks Essay
  • It Risk Analysis Case Study Essay
  • Essay about Security Requirements & Possible Risks
  • Week 8 Assignment Identifying Potential Risk Response and Recovery Essay
  • Essay on Threats and Vulnerabilities in IT Infrastructure
  • Essay about IS3110 Lab 2 Align Risk, Threats, & Vulnerabilities to COBIT P09 Risk Management Controls
  • Essay on Risk management
  • Briargrove Risk Analysis Assignment Essay

Become a StudyMode Member

Sign Up - It's Free