Saturday, June 8, 2019
Threats and Vulnerabilities Essay Example for Free
Threats and Vulnerabilities EssayThreat An unauthorized employee tries to access data that is hosted on the server. Vulnerability The organization does not engross earmark and access controls. Likelihood The likelihood is very low, depending on the organization and its budget. For the most part, most organizations have IT specialists that are tasked to keep everything on the network secure. In the government most all data is protected by multiple forms of security.LAN DOMAIN Weak countersigns could be broken with a brute pressure attacks. Ensure all access permissions are set up correctly. If there is not attention to detail with configurations unauthorized access may be well to obtain on the network and information could be compromised or stolen.Threat Any type of malicious software that enters the network. Vulnerability Antivirus software doesnt strike the virus. Likelihood The likelihood is frequent. Anti-viruses have a hard time keeping up to date before new viruses po p up. The best way to cross with this is keeping the automatic update enabled for ones virus protection program, and if you suspect a virus either shutdown or at least(prenominal) disconnect from the network to prevent further contamination of the network.REMOTE ACCESS DOMAIN Remote users could be infected with a virus, and when they connect to the internal network, they cigarette propagate the virus without any knowledge. Threat An attacker modifies or defaces a lodge Web site. Vulnerability The Web site isnt protected.Likelihood The likelihood of this is minimal, unless an inexperienced webmaster was hired. One way to avoid this is have a backup IT specialist to do checks and balances to ensure the website is secure. Another way to prevent this is by ensuring permissions and authentication is programmed in good order.LAN-TO-WAN DOMAIN A malicious web sites may be allowed access, malicious software may be downloaded, or firewalls are not assemble right all of these can compro mise a network or its website.Threat A social engineer tricks an employee into revealing a password. Vulnerability Users are not trained or briefed properly about the bon tons policies. Likelihood This is highly likely. Employees should have refresher courses given by the company on a regular basis.USER DOMAIN Social engineering represents different ways for users to mingle and try to find a way to get a password out of another user it is done by phishing or even direct contact with a user.Threats and vulnerabilities are very important issues to tackle it is up to company supervisors and IT leaders to ensure that everyone is up to date on computer viruses and how to keep hackers at bay. There are ways of doing this, by ensuring that employees are properly trained and briefed on any pertinent network issues that they have a direct affect on. One way is to ensure personnel are checking their company e-mail. Proper authentication needs to be setup for each user dependent on skills, th eir current position, and their need to have access to avoid futurity issues. If giving remote access to an employee ensure the computer they use is updated before allowing them to log onto the VPN tunnel for work.The IT department or configuration team should ensure that theyve configured web site filtering and access. To ensure limited access Mac Address filtering brings another level of security and helps keep a log of hardware and when it accesses the company network. There are many ways to secure and protect a network, and there is also many way to attack one. No one formulate is fool proof. A company must find the sweet spot for what system costs are more to maintain than it the costs to repair them if compromised.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.