Preview

Draft Risk Management Plan

Satisfactory Essays
Open Document
Open Document
650 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Draft Risk Management Plan
Security Threats
Alfred De Leon III
IS4560
Project Part 1: Current Security Threats
The top three security threats that Aim Higher College faces are the following:
* Mobile devices connecting to the network
* Social Media
* Compromised routers intercepting sensitive information
These threats are the most common that any college faces. The threats have remained at the top of the list every year for a variety of reasons. This list of threats is also unique to college campuses. I will discuss each of the threats in this report.
Students, especially college students, are consistently on some type of social media site or on a mobile device that gains them that type of access. There are many varieties of devices such as tablets, smartphones, laptops, and now even smartwatches. Devices such as these are connecting to wireless networks whether it’s from a service provider or campus. With these connections many aren’t just using them for social media, but also for checking grades, schedules, or relevant news. The devices depend on connecting to networks but also need to do so in a secure fashion. Each device has to be checked for viruses, spyware, and other types of malware while still maintaining the C-I-A triad. A balance must be found between usability and security. Each time a remote device is connected to the network there is a possibility that the network can be compromised by one these devices. Every device should be authenticated, scanned, and identified. Many are unaware of the risks that can come from connecting to networks, especially wireless access.

The use of social media has increased in recent years and according to this chart we can see according to age groups how many are connecting to social media. Students and teachers both use things like Facebook, Myspace, Linkedin, Instagram and many more. These applications have the potential to transmit malware every time they are used on the campus network. Malware can be embedded in everything



Citations: http://cve.mitre.org/find/index.html http://nvd.nist.gov/ http://www.securityweek.com/college-cyber-security-tightrope-higher-education-institutions-face-greater-risks http://campustechnology.com/Articles/2011/01/12/Higher-Education-Top-Five-Network-Security-Threats-for-2011.aspx?Page=2 http://royal.pingdom.com/2010/02/16/study-ages-of-social-network-users/

You May Also Find These Documents Helpful

  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Riordan Manufacturing is a Fortune 1000 company that specializes in the plastic injection molding industry. They are an international company with facilities in California, Georgia, Michigan, and China. Their products include beverage containers, plastic fan parts, and custom plastic parts. Riordan prides themselves on their industry leading research and development (University of Phoenix, 2009).…

    • 1304 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Business development brings weights to a framework that might not have had room schedule-wise/experience to get intended up for expanded generation or administrations. New timings of payables/receivables may make monetary strain. Clients may feel underserved. Workers may be uneasy about all the progressions.…

    • 1477 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    After reviewing the new network design, we have seen several threats and came up with countermeasures to prevent these attacks. The first threat is the connection between the internet and the company’s router and connection between the wireless router and switch. Hackers, viruses, and malware can easily get in through this connection and infect the network. The countermeasure for this is a firewall or intrusion detection system. This equipment will help detect any unwanted guests the get onto the network. You can control what traffic comes in and out of your network. Next would be the wireless router being unsecured. If this router is left open and SSID board casting, any within its range can access the company’s network. A countermeasure for this is password encryption and stealth id. Hiding the id of the router will allow it to be hidden from anyone scanning for wireless routers to use. Encryption password puts a lock on the router to where only people with the key can access the router. The last threat would be the workstations and laptops. Users make the most mistakes on these machines. They download and go to places they shouldn’t which causes the risk of viruses and hackers. Countermeasures are Anti Viruses, patches, and teaching. Anti-viruses will help protect against viruses and malware that can allow hackers to enter the system and still information. It’s important to keep the definitions up to date so the AV can protect against the latest viruses. Updating OS with patches can also prevent security threats. Teaching users the dos and don’ts of security issues can help them be aware of the threats and what they should do to help prevent risks from occurring.…

    • 292 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Rowe, J. (2013, June). Preventing Patient Falls What are the Factors in Hospital Settings that Help Reduce and Prevent Inpatient Falls?, Home Health Care Management & Practice, 25(3), 98-103. University of Phoenix Online Library…

    • 1323 Words
    • 4 Pages
    Better Essays
  • Better Essays

    For students, the main threat comes from identity theft, often a result of inappropriate practices connected to social media and email attacks. Often, attacks to a college network occur because of unintentional and misguided errors from students.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Good Essays

    This part of the management plan consists of conducting a risk audit. This is an essential part of the process of developing this management plan. Since this is a medium size organization one of the first steps would be to visualize and understand the risks. Questions like need to be asked like: What risks to the organization are relevant? What risks are visible? Are there risks that are jus not seen, are impossible to mitigate or are unable to be measured. Looking at the organizations infrastructure, the likelihood that if one of the stores gets infected, it could effect the other 268 stores makes it a must that high risks should be prioritized first. The risk management strategies should include a network design for agility…

    • 1171 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Who are the key participants in developing a risk management plan? Who owns and maintains the risk management process? What are the key deliverable of the risk management planning process? Explain how these deliverables assist an organization in effectively dealing with risk.…

    • 355 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Risk Management Plan Final

    • 7114 Words
    • 23 Pages

    The Business Continuity Plan (BCP) is designed to prepare an organization to continue doing business when a disaster strikes. The BCP differs…

    • 7114 Words
    • 23 Pages
    Powerful Essays
  • Good Essays

    Some risks that I have identified are social engineering techniques due to the excessive trust given to messages coming from friends, contacts or followed people within the OSN(Online-Social Network) identity theft and information leaking furthermore, spam sending and malware distribution through Social Networks are increasing at an incredible pace. They are not the only threats.…

    • 526 Words
    • 3 Pages
    Good Essays
  • Good Essays

    What do you do? You have a legal, ethical, and financial responsibility to make certain the event and its operations maintain the highest standards of safety possible. You have a responsibility to protect the brand and quality of your meeting planning firm, and you have a responsibility to maximize the happiness and revenue for your client. What will you do?…

    • 518 Words
    • 3 Pages
    Good Essays
  • Good Essays

    My choose for a targeted healthcare organization is the VA New Jersey Health Care System, which is a non-profit government healthcare organization that consist of two large campuses’ located in New Jersey. The campus is Lyons Medical Center located in Lyons, NJ and the VA Hospital located in East Orange, NJ. The VA New Jersey Health Care System is dedicated in providing care to veterans based on their needs ranging from outpatient to inpatient care in an array of various surgical, acute care, and specialty medical services and programs, such as cardiovascular and infectious disease, mental health, and rehabilitation therapy (U. S. Department of Veterans Affairs, 2015).…

    • 457 Words
    • 2 Pages
    Good Essays
  • Best Essays

    Besides this governmental change, there are also parts of the Patriot Act that are in contrast with the laws that are set in the US Constitution: The fourth amendment of the Constitution clarifies “the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated… or things to be seized”, while the Patriot Act reverses this right by enabling the government to “search and seize American’s papers and effects without probable cause to assist terror…

    • 2726 Words
    • 11 Pages
    Best Essays
  • Good Essays

    Social Media has become very popular due to the growth of technology and the ability to use our phones as computers. Social Media is a place that young teens and adults use to connect to friends and family. Yet many people have been caught trying to use sites like this to…

    • 812 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Bomb Threats In Schools

    • 283 Words
    • 2 Pages

    Bomb threats continue and will be a problem on school campus across the nation. Bomb threats are made for various reasons, with most designed to be disruptive of school. There must be four primary objectives that will take priority regardless of the reason for the bomb threat.…

    • 283 Words
    • 2 Pages
    Satisfactory Essays