Sunday, June 16, 2019
IT 4076 Evaluation and Risk Assessment Research Paper
IT 4076 Evaluation and Risk Assessment - Research Paper ExampleAll organizations are exposed to threats and vulnerabilities that lay down adversarial impacts on the companies operations. entropy security professionals have the responsibility of helping the organizations management boards to comprehend and control these uncertainties. Threats Threats are the sources and means of particular types of polish ups. Threat depth psychology enables culture security experts to ready the most appropriate approaches of securing systems against systems attacks. Security professionals perform penetration-testing exercises to identify threat profiles, develop effective countermeasures against threats and mitigate all earlier signs of threats (Kaiya, Sakai, Ogata & Kaijiri, 2013). The primary focus of threat analysis should be on analyzing the resources of the attackers. It is decisive for all organizations to analyze threats to help them develop specific security policies, which they can imp lement together with policy priorities and comprehend murder needs for securing organizational resources. Information security threats include accidental disclosure, alteration of software, electrical disruption, acts of nature, and telecommunication malfunction. Vulnerabilities Vulnerabilities are the security flaws that allow a threat attack to be successful in a system. Corporate organizations and private businesses should do vulnerability testing to resolve the vulnerabilities and provide data required to identify unlooked-for perils to information security. The management boards should realize that such vulnerabilities do not particularly belong to technology class, but also apply to social factors, for example, personal hallmark and authorization policies. Vulnerability testing is of paramount importance in maintaining ongoing security and allows the professional responsible for security of the companys resources to respond to youthful dangers as they arise (Kevin, Hackney & Edgar, 2010). Testing for vulnerabilities is also invaluable in developing policy and technology and as part of the technology selection process. It is crucial for buyers to do effective vulnerability tests in order to select the right technology that can save time, money and other costs of business operations. My get word with an Information Security Threat I am the Managing Director a telecommunication company that offers postpaid communication operate to the residents of Silicon Valley. Recently, I have realized that the costs of making calls were increasing abnormally among the callers. I communicated to my customers and requested from them some information concerning their communication expenditures. I found out that my customers were not really consuming these huge amounts of airtime to make calls. The information security professional made a follow-up and found out that there was massive phreaking and eavesdropping. Hackers were stealing services and using them while pas sing the costs of making calls to my customers. It was also found that these hackers had stolen credentials and contact information of my customers, which allowed them to control their voice calls, calling plans, billing information and call forwarding. Information is the cornerstone of the company, and its security is of paramount i
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment