Preview

Cheater Case

Good Essays
Open Document
Open Document
601 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cheater Case
here is to estimate the likelihood of a successful attack by the cheater. Use the worst-case cheater. o Skill level: how technically skilled is the threat agent (cheater)? Security penetration skills (9), network and programming skills (6), advanced computer use (5), some technical skills, no technical skills (1) o Motive: How motivated is the cheater to find and exploit the vulnerability? Low or no reward (1), possible reward (4), high reward (9) o Opportunity: what resources and opportunities are required for the cheater to find and exploit vulnerability? Full access or expensive resources required (0), special access or resources required (4), some access or resources required (7), no access or resources required (9) o Size: How large is …show more content…
Fully traceable (1), possibly traceable (5), completely anonymous (9)
Business Impact Factors: The business impact stems from the technical impact, but requires a deep understanding of what is important to the institution running exams. The business risk is what justifies investment in fixing security problems. Many institutions have an asset classification guide and/or a business impact reference to help formalize what is important to their business. These standards can help to focus on what's truly important for security. If standards aren't available, then it is necessary to talk with people who understand the business to get what is important. The factors below are common areas for many business. o Financial damage: How much financial damage will result from an exploit? Less than the cost to fix the vulnerability (1), minor effect on annual profit (3), significant effect on annual profit (7), bankruptcy (9) o Reputation damage: Would an exploit result in reputation damage that would harm the business? Minimal damage (1), loss of goodwill (5), brand damage (9) o Non-compliance: How much exposure does non-compliance introduce? Minor violation (1), clear violation (5), high profile violation

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 6 Paper

    • 853 Words
    • 4 Pages

    Fourth, in the aftermath of the attack, the risks and threats that the company is exposed are further security breaches that could expose critical and private secret trading information of the company. This could lead to financial loses since hackers can…

    • 853 Words
    • 4 Pages
    Good Essays
  • Good Essays

    21.) What do you call an attempted hacking, where every possible every possible combination is used?…

    • 641 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab #2

    • 402 Words
    • 2 Pages

    2. What is the relationship between risks, threats, and vulnerabilities as it pertains to information systems…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    cardinals wholesaler case

    • 2103 Words
    • 6 Pages

    Motive-incentive or pressure that drives an individual to commit fraud. This is caused by life pressures, illicit activities or lifestyles needs that create personal financial problems.…

    • 2103 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    The Motives Behind Hacking: Vandalism, Public Interest, Reveal Wrongdoing, Financial Gain, As a Protest, The Challenge (fun).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 2 Answers Nessus

    • 628 Words
    • 3 Pages

    This lab demonstrates the first 3 steps in the hacking process that is typically performed when conducting ethical hacking or penetration testing. The first step in the hacking process is to perform an IP host discovery and port/services scan (Step 1: Reconnaissance & Probing) on a targeted IP subnetwork using ZenMap GUI (Nmap) security scanning software. The second step in the hacking process is to perform a vulnerability assessment scan (Step 2: Scanning) on the targeted IP subnetwork using Nessus® vulnerability assessment scanning software. Finally, the third step in the hacking process (Step 3: Enumeration) is to identify information pertinent to the vulnerabilities found in order to exploit the vulnerability.…

    • 628 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Data breaches and cyber-attack frequency has dramatically increased in recent years, with the advancement of technology and the prevalence of more “cloud” storage and remote access servers. In Mr. Horton’s article, he remarks on the high cost a data breach can have on both finances and a company’s reputation. (Horton, 2014) Citing the Ponemon Institute’s 2013 Cost of a Data Breach Study, Horton goes on to state that “data breaches can cost an average organization more than $5 million per incident.” (Ponemon Institute, 2013)…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Before we get into the details let first examine what exactly is a security vulnerability. By definition a security vulnerability can be flaws in hardware, software, networks or the employees that use them which in turn can allow hackers to compromise the confidentiality, integrity and availability of the information system (“Common Cybersecurity,” 2011). To thoroughly discuss this topic in more detail I will first discuss Confidentiality as it is one of the three main goals of IT Security. Confidentiality is as simple as it sounds, limiting…

    • 3199 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 7 Lab

    • 293 Words
    • 2 Pages

    3. How does risk management and risk assessment relate to a business impact analysis for an IT infrastructure?…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Computer Memory Hacking

    • 820 Words
    • 2 Pages

    that they are capable of doing so. By demonstrating this skill, the hacker (the person gaining…

    • 820 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Risky Situations

    • 2619 Words
    • 11 Pages

    | |Compliance risk – This comes from violations with law regulations and ethical |I would say there is a high chance of this appearing on a risk analysis report. |…

    • 2619 Words
    • 11 Pages
    Better Essays
  • Good Essays

    An information system security breach could result in serious financial losses, the disclosure of protected private information, loss of research and development data or fines by regulatory agencies. Losses due to intrusions into an information system could negatively affect the general public (i.e. power failures). This might result in costly class action lawsuits that could exceed an organization's ability to pay and result in its dissolution. Even an individual might be sued for negligence and be financially ruined.…

    • 532 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Data breaches that could lead to identity theft, by sector - the danger of data breaches are of particular importance for organizations that store and manage large amounts of personal information. Not only can compromises that result in the loss of personal data undermine customer and institutional confidence, result in costly damage to an organization’s reputation, and result in identity theft that may be costly for individuals to recover from, they can also be financially debilitating to organizations.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    “In 2004, with the revisions to the Sentencing Guidelines for Organizations, GM recognized the need for a more centralized compliance function.” “There has always been an emphasis on compliance, but it was decentralized,” (Singer, 2008, para. 5).…

    • 2093 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Hacks of this nature do not just have an affect on the targets. Customers also bear some of the burden. Not all of the impacts will be clearly defined or immediately obvious. While credit card companies may reimburse a customer for their stolen money, they do not have the ability to pay for the time the customer spends trying to get their money back, the confidence lost in the security practices of corporations, and most importantly, the emotional impact of dealing with the…

    • 724 Words
    • 3 Pages
    Good Essays