Week 8 Assignment Identifying Potential Risk Response and Recovery

Better Essays
Topics: Risk management
Identifying Potential Risk, Response, and Recovery
Maria A. Tisdale
Strayer University
CIS 333
Professor Robert Whale
December 1, 2014
Identifying Potential Risk, Response, and Recovery
The CIO has requested that we follow up with a plan that is detailing a strategy for addressing all risks identified in the previous research. This plan needs to identify controls in administration, preventative, detective and corrective. With this data, the business will be able to mitigate each risk that we identified earlier. The following paper will explain the approach to correcting the various malware.
The three malicious attacks and threats that are identified from the previous investigation are called man in the middle (MITM), Denial of Service (DoS) and advanced persistent threats (APT). These three malicious attacks and threats not only expose the company to risk but can avoid the proper tools and training. An MITM is very dangerous to any company because data sent over a network, and the MITM threat can intercept this data. This information is then sent to the receiving individual after the MITM has reviewed or changed the data from the sender. In order to avoid the risk, you can receive help with decryption. Data in plain text is easily sniffed out or stolen; data sent over a network that encrypted is only readable by the sender and receiver if the proper decryption tools are present. Both parties will avoid the risk altogether with encryption.
A strategy to use against a Denial of Service (DoS) attack would be risk acceptance. Customers and company employees utilize the company’s website on a day to day basis, without a functioning website revenue will be lost. Because a DoS attack can make a business’s website unserviceable, the company will have to take into account this factor while the site is accessible to the public. Risk avoidance and risk assignment cannot be utilized in this situation because the site has to be up and running for customers and employees

You May Also Find These Documents Helpful

  • Powerful Essays

    Identifying Potential Risk 1 Assignment 1: Identifying Potential Risk, Response, and Recovery CIS333 Identifying Potential Risk 2 In this paper I have just been hired as an Information Security Engineer for a video game development company. I have previously identified all of the potential Threats, Vulnerabilities and Malicious Attacks for the videogame development company. The CIO have reviewed my report and has now requested that I draft a report…

    • 1574 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Running Head: IDENTIFYING RISKS, RESPONSE, AND RECOVERY 1 Identifying Risks, Response, and Recovery Amy E. Moody Strayer University CIS333 Professor Williams IDENTIFYING RISKS, RESPONSE AND RECOVERY 2 Identifying Risks, Response and Recovery I previously identified several types of attacks, threats and vulnerabilities that exist with your multilayered network. I have now been charged with the responsibility of developing a strategy to deal with these risks as well…

    • 1443 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Week 8 Assignment

    • 689 Words
    • 3 Pages

    BUSN 5260 Current Economic Analysis Problems Problem 1 In what specific ways (if any) does a college education increase a worker's productivity? Take some special care with this problem. I think that a college education can be beneficial in increasing a worker’s productivity in a few ways. First, utilizing a college degree in a concentrated area like management allows you to better plan your workforce tasking, delegation techniques, conflict resolution and hiring capacities. Granted, all…

    • 689 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Tiffany Kearse Identifying Potential Malicious Attacks, Threats and Vulnerabilities CIS/333 Robert Whale November 2, 2014 With any network organization you want to make sure that you keep on top of vulnerabilities of anything that reaches out to the internet. Computers and servers that touch the internet are ones that must be scanned. As a company you have to make sure that you configure the security settings for the operating system, internet browser and security software…

    • 609 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Identifying Potential Malicious Attacks, Threats and Vulnerabilities CIS 333 Network Security Fundamentals July 23, 2014 We have been tasked by the CIO to draft a report identifying potentially malicious attacks, threats, and vulnerabilities specific to our organization. Further, the CIO would like us to briefly explain each item and potential impact it could have on the organization. Malicious Network Attacks "Network attack is usually defined as an intrusion on your network infrastructure that…

    • 1430 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Week 8 Assignment 4

    • 5709 Words
    • 23 Pages

    Week 8 Assignment 4 Internet Technology, Marketing, and Security James Bradley Stroble Dr. Akpan BUS508 Contemporary Business November 30, 2012 Social media marketing has become exceedingly popular among business of all sizes. So many people use social networks every day. Marketing for business can get very expensive. With social networking, businesses can promote their products and build their fan base. A business can use Facebook or Twitter to alert customers…

    • 5709 Words
    • 23 Pages
    Powerful Essays
  • Satisfactory Essays

    It 205 Assignment Week 8

    • 1078 Words
    • 5 Pages

    starting a major IT projects and there are scope, time, cost, quality, and risk. Most major IT projects will require a project manager to handle to overseeing of the project. The project management refers to the application of knowledge, skills, tools, and techniques to achieve specific targets within specified budget and time constraints. Project managers activities will include the planning of the work, assessing the risk, estimating the costs required to complete the project, and several other…

    • 1078 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    ITMG381 - Week 8 Fill in your name above, put your answer below each question, and then return this document for grading following the instructions in the syllabus. Please provide detailed answers to support all of the questions. Use examples from the readings, or from your own research, to support answers. The assignment must be 1-page in length with a minimum of 2 outside sources. Chapter 14 A large American multinational corporation wants to establish a telephone and email hotline…

    • 630 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Week 8

    • 1515 Words
    • 6 Pages

    Week 8 - Lesson 8 Reading Assignment Read Chapter 13: Strategic Control Read Chapter 14: Innovation and Entrepreneurship Review PowerPoint slides for Chapters 13 and 14 Lesson Activity Discussion Questions (DQ). Please post in the Discussion Forum by this week Friday 11:59 P.M. (PST). 1. Why is strategic control important in the strategy implementation process? What are the four major types of strategic control? What are the pros and cons of each? 2. The balanced scoreboard approach has gained popularity…

    • 1515 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Week 8 Assignment Sci

    • 820 Words
    • 4 Pages

    foods that are now available; but one thing is for certain, there are health risks associated with obesity and eating disorders. Risks associated with eating disorders include “stunted growth, delayed menstruation, damage to vital organs such as the heart and brain, nutritional deficiencies, including starvation, cardiac arrest, and emotional problems such as depression and anxiety” (At Health, 2010). Some of the health risks associated with obesity are “high blood pressure, stroke, cardiovascular…

    • 820 Words
    • 4 Pages
    Good Essays