Week4 Team Assignment
Topics: Security, Risk, Computer security, Information security / Pages: 7 (1650 words) / Published: Sep 17th, 2013

Riordan Manufacturing Audit Risk CMGT/582

Riordon Manufacturing Audit Risk
As Information Systems become more complex and business organizations become better prepared at protecting these systems so has the means in which attacks on these systems evolved. Many new issues have emerged and are changing the way in which or world views hackers and the chaos that these individuals can cause. The purpose of this section is to discuss some of the most visual and controversial of these issues. Finding solutions to avoid these attacks are what drives the need for security and security systems to constantly evolve and adapt to new threats and avoid being overrun and or shut down due to malicious actions of hackers who only wish to cause mayhem.

Distributed Denial of Service (DDoS)
According to an article that I have located using a Google search engine, some of the highest utilized issues that occur are:
“1. State-sponsored espionage: This challenge highlights the need to protect critical data from politically or financially motivated threats. Critical data includes the information needed to run network attached infrastructure as well as the intellectual property used to manage business and drive innovative solutions.
2. Distributed denial of service (DDoS) attacks: Security professionals in the financial services industry are likely to agree to our second challenge: DDoS attacks. We can expect to see a higher risk of business impacting threats with the shift from computer-based attacks, generating large number of lower bandwidth events, to virtual server or cloud-based attacks, generating ultra-high bandwidth events. With these new attack vectors it becomes even more beneficial to identify and mitigate large DDoS events while traffic is in the network cloud. (Hurst, 2013)”
DDoS affects an organizations ability to communicate effectively and operate at a maximum pace. Attacks cause bandwidth issues. This simply means that the organizations

References: 360factors, Inc... (2013). Information Security Risk Management. Retrieved from http://www.360factors.com/information-security-risk-management McCafferty, T. (September 15, 2011). 5 Costly Cloud Migration Mistakes. Vyatta Special to ZDNet, 1. Retrieved from http://www.zdnet.com/news/5-costly-cloud-migration-mistakes Top 10 Security Challenges for 2013. (2013). Retrieved from http://www.scmagazine.com/top-10-security-challanges-for-2013 Ashford, W. (2013, July). Insider threat: Balancing security with privacy. Retrieved from http://www.computerweekly.com/news/2240197233/Insider-threat-balancing-security-with-privacy Symantec Corporation. (2013). Bots and Botnets—A Growing Threat. Retrieved from http://us.norton.com/botnet/ Symantec Corporation. (2013). Enterprise Mobility Trends. Retrieved from http://www.symantec.com/mobility/trends/?inid=us_mobility_home_intro_exec

You May Also Find These Documents Helpful

  • Week4 Assignment
  • Week4 Assignment
  • FIN370 Week4 Team DRAFT
  • week4
  • RES/351 week4 team reflection
  • week4
  • iLab Week4
  • Team Assignment
  • week4 res351
  • Assignment: Effective Team