Preview

Week 5 you decide

Good Essays
Open Document
Open Document
928 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Week 5 you decide
Week 5 You Decide

Security is an ever moving target that must be continually managed and refined to ensure appropriate confidentiality, integrity, and availability of services and systems that are critical to business, as well as the valuable data.

Waves of targeted email attacks, often called phishing, are exploiting client side vulnerabilities in commonly used programs such as Adobe PDF Quick Time, Adobe Flash, and Microsoft Office. This is currently the primary initial infection vector used to compromise computers that have access to the internet and the network.

Social engineering attacks are another concern for our company. People tend to use sites like Facebook in order to communicate with other employees, family, and friends. It is in our best interest to have strict policies constantly in place to validate the uniqueness of the user prior to a password reset being made.

Insiders have caused damage to networks being terminated or remain in a position to provide information to the outside. They can set up fake websites that look like a real product or supplier but are actually malicious sites designed to attack the computer and add malicious code to the key log, use contact lists, steal data, and other malicious purposes.

Vulnerability scanners can help determine patching policy. Once we know what vulnerabilities are exposed, we can make decisions about what can and cannot be tolerated in the network environment. Knowing our typical network behavior can highlight common activity that we might want to stop via policy or other tools. Both of these technologies provide visibility into network traffic. Network risk mapping can find vulnerable data and network device configurations and help us prioritize which issues to resolve first. Data can be based on defined nodes, directly vulnerable hosts, non-secured configuration of network equipment, and the end users most susceptible compromises.

By

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Phishing is when a person tries to trick either the customer or company that the email is legit and comes from a legitimate source and try to ask the customer for their account information.…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Sr-Rm-022 Part 2

    • 839 Words
    • 3 Pages

    Security should be a high level of concern in any project. “Security is primarily the responsibility of the operations group, which consist of the staff responsible for installing and operating security controls such as firewalls, intrusion detection systems, and routine backup and recovery operations” (Denis, Wixom, & Roth, 2009). However, system developers also have a responsibility when it comes to security, especially within the information systems.…

    • 839 Words
    • 3 Pages
    Good Essays
  • Good Essays

    week 4 you decide

    • 1416 Words
    • 7 Pages

    The $300,000 is treated as business income. After deducting all of the business expenses, the…

    • 1416 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    * Messages often contain attachments that exploit weaknesses in client-side applications, or links to websites that exploit vulnerabilities in Web browsers or browser plug-ins.…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    You Decide Week 5

    • 1238 Words
    • 5 Pages

    In the case of Smackey’s, the audit firm would do well to enlist the help of those who have taken part in an audit in the dog food business. They could lend insight into the intricacies of the business without the need to do extensive research.…

    • 1238 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Week Five

    • 268 Words
    • 2 Pages

    f(x2-3)( F IS NOW WORKING ON THE RULE OF G) = 2(x2-3)+5 (THE RULE OF F IS APPLIED TO G) = 2x2-6+5 (SIMPIFIED) =2x2-1 (FINAL ANSWER)…

    • 268 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Week 6 - You Decide

    • 894 Words
    • 4 Pages

    Part I: Discuss the various forms of organization that are available to Penelope, Mark, and John.…

    • 894 Words
    • 4 Pages
    Good Essays
  • Good Essays

    You Decide, Week 5

    • 777 Words
    • 3 Pages

    Is Software Inc. liable for the cost of the ring Coleman stole? I would say no. Even though Coleman was on a business trip acting as an agent of the company, going to the jewelry store was not part of his job. “A person dealing with an agent cannot hold the principal liable for any act or transaction of the agent not within the scope of his/her actual or apparent authority” (USLEGAL, Inc., 2012). If Coleman had been in the jewelry store doing business, then Software Inc. could be held liable.…

    • 777 Words
    • 3 Pages
    Good Essays
  • Good Essays

    You Decide week 5

    • 831 Words
    • 3 Pages

    Good day MS Kim, I would like to explain the available options of Access Control Lists what will do and what types of ACLs there are. Complex ACLs can be tricky but will better for security for the network. There are three different types of ACLs, Dynamic ACL, Reflexive ACL, and Time Based ACL. Each ACL is unique to the type of network we have. Dynamic are also called lock-and-key ACLs which only allow IP traffic only. Also the lock-and-key authenticates the user and permits limited access through the firewall router for a host for a time. Time Based ACLs are a specific time that traffic is allowed on the network. When the device determines that an ACL applies to a packet, it tests the packet against the rules. The first matching rule determines whether the packet is permitted or denied. If there is no match, the device applies a default rule. The device processes packets that are permitted and drops packets that are denied. “ACLs protect networks and specific hosts we would be able to specify certain days and hours of which the user will have access to the network. With this type of ACL there is more control over permitting or denying access to resources. Reflexive ACL allows outbound traffic from the network and limits the inbound traffic. This allows greater control over what traffic is on the network and able to expend the control list. Also, with Reflexive when ACL, an unknown IP address is trying to gain access, it will put the IP address in a temporary ACL group and will await replies from the network and the network will automatically remove the IP address when the session is over. It is probably in the best interest for our network to concentrate on Reflexive ACLs for these reasons;…

    • 831 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    All rights reserved. Page 6 Types of Vulnerabilities  Insecure servers or services  Exploitable applications and protocols  Unprotected system or network resources  Traffic interception and eavesdropping  Lack of preventive and protective measures against malware or automated attacks NT2580 Introduction to Information Security…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Socs315 Week 5 You Decide

    • 1100 Words
    • 5 Pages

    When you are in a relationship, arguments or disagreements can arise. They can often trigger strong emotions that lead to hurtful words and uneasiness. If these conflicts are not resolved in a healthy way, resentment and a dissolved relationship could follow. However, when they are resolved in a proper manner, it could promote growth between the couple and fortify the bonds of their relationship (Conflict Resolution Skills).…

    • 1100 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Week 5

    • 290 Words
    • 2 Pages

    There are five steps that you use when using the hypothesis texting. The five steps are step 1: State the hypothesis, and what we are trying to prove. Step 2: Describe the size of the sample and the population from which data is being gathered. Where and how are we going to produce evidence to support our hypothesis? Step 3: Identify the statistics being tested and the data that will be used to support the hypothesis. Step 4: Find the critical value and determine what evidence will directly support a hypothesis. Step 5: Calculate the value of the test statistic, using the sample data.…

    • 290 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Week 3 You Decide

    • 543 Words
    • 3 Pages

    Raymond Burke’s idea is great. It gives us the safest hit in the new market and keeps our risk low. The con is that we might lose our technological advantage in 2 years. Another con is that we lose most of our control and money if we partner with an existing company.…

    • 543 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Risk Threat Vulnerability

    • 719 Words
    • 3 Pages

    The following risks, threats, and vulnerabilities were found in an IT infrastructure. Consider the scenario of a Healthcare provider under HIPPA compliance law and what compliance to HIPPA involves.…

    • 719 Words
    • 3 Pages
    Good Essays