Preview

Week 8 Assignment Identifying Potential Risk Response and Recovery

Better Essays
Open Document
Open Document
1122 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Week 8 Assignment Identifying Potential Risk Response and Recovery
Identifying Potential Risk, Response, and Recovery
Maria A. Tisdale
Strayer University
CIS 333
Professor Robert Whale
December 1, 2014
Identifying Potential Risk, Response, and Recovery
The CIO has requested that we follow up with a plan that is detailing a strategy for addressing all risks identified in the previous research. This plan needs to identify controls in administration, preventative, detective and corrective. With this data, the business will be able to mitigate each risk that we identified earlier. The following paper will explain the approach to correcting the various malware.
The three malicious attacks and threats that are identified from the previous investigation are called man in the middle (MITM), Denial of Service (DoS) and advanced persistent threats (APT). These three malicious attacks and threats not only expose the company to risk but can avoid the proper tools and training. An MITM is very dangerous to any company because data sent over a network, and the MITM threat can intercept this data. This information is then sent to the receiving individual after the MITM has reviewed or changed the data from the sender. In order to avoid the risk, you can receive help with decryption. Data in plain text is easily sniffed out or stolen; data sent over a network that encrypted is only readable by the sender and receiver if the proper decryption tools are present. Both parties will avoid the risk altogether with encryption.
A strategy to use against a Denial of Service (DoS) attack would be risk acceptance. Customers and company employees utilize the company’s website on a day to day basis, without a functioning website revenue will be lost. Because a DoS attack can make a business’s website unserviceable, the company will have to take into account this factor while the site is accessible to the public. Risk avoidance and risk assignment cannot be utilized in this situation because the site has to be up and running for customers and employees

You May Also Find These Documents Helpful

  • Good Essays

    Experiencing problems with the web site is the most prominent signs that a database, attack that can occur. The attack on a computer hosts are often zombie computers with broadband connections to the internet threat have been compromised by viruses or Trojan horse programs that allow the perpetrator to remotely control the machine and direct the attack, often through a botnet/dosnet. Launching a DoS attack can have a negative impact on the business of an organization. The result of the attacker can lead to a loss of reputation along with economic losses. A successful DoS (Denial of Service) attack can disable computers and subsequently, an entire network. An attack launched by a moderately configured system can crash PCs that are of high value. The following steps should be followed when conducting a DoS penetration test: 1) Test heavy loads on the sever; 2) Check for systems and devices vulnerable…

    • 392 Words
    • 2 Pages
    Good Essays
  • Good Essays

    RLOT2 Task 2 B rev 1

    • 569 Words
    • 2 Pages

    The complete protection of the campus infrastructure from a (D)DoS is futile however, there are measures that can be put into place which will significantly reduce the risk of an outage due to a (D)DoS. Standardizing policies and procedures, segmenting the network into functional areas, active monitoring, and a defense in depth approach will reduce the duration and severity of any future (D)DoS attack.…

    • 569 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Configure routers and firewalls to deny all ping requests to reduce chances of DOS attacks and setup redundant internet connections to increase availability. Scanning of all email for malicious software and isolate anything that is…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cs150 Unit 3 Assignment

    • 498 Words
    • 2 Pages

    In a Denial-of-Service (DoS) attack, a malicious client (the attacker) performs operations designed to partially or completely prevent legitimate clients from gaining service from a server (the victim). (Brustoloni, N.D.) To defend your system from DoS attacks it typically involves the use of a combination of attack detection software, aiming to block traffic that is identified as illegitimate and allow all traffic that is identified as legitimate. Some traffic classification and response tools are Firewalls, Switches, Routers, Application front end hardware, IPS based prevention, DDS based…

    • 498 Words
    • 2 Pages
    Good Essays
  • Good Essays

    You Decide- Sec572 Week 2

    • 577 Words
    • 3 Pages

    Denial-of-service DoS attacks DoS attack is simply to send more traffic to a network address than the programmers who planned its data buffers anticipated someone might send. The attacker may be aware that the target system has a weakness that can be exploited or the attacker may simply try the attack in case it might work. According to AppliCure Technologies preventing Denial of Service Attack With dotDefender web application firewall you can avoid DoS attacks because dotDefender inspects your HTTP traffic and checks their packets against rules such as to allow or deny protocols, ports, or IP addresses to stop web applications from being exploited…

    • 577 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt280 Week 1 Homework

    • 359 Words
    • 2 Pages

    L. Use workstation antivirus and malicious code policies, standards, procedures, and guidelines. Enable an automated antivirus protection solution that scans and updates individual workstations with proper protection.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Compute the risk score for each of these individuals using both theMissouri and Washington Risk Assessment models.…

    • 415 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Ethics Case Analysis

    • 1127 Words
    • 4 Pages

    A Denial of Service (DoS) attack on the corporate IT system at IVK Corporation. (Adapted from the book The Adventures of an IT Leader, 2009, Harvard Business School Publishing). After reading the case description, answer the questions that follow.…

    • 1127 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Project Pt 1

    • 338 Words
    • 2 Pages

    Richman Investments has experienced an increase in security breaches that have resulted in the loss of company proprietary information and damage to systems due to many virus and Trojan Horse infections. The following outline contains some of the security mitigation proposals to be implemented shortly. This is just a basic plan for the moment and if security breaches continue, more stringent policies will be installed.…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 7 Ethical Hacking

    • 293 Words
    • 2 Pages

    In this lab, you used AVG AntiVirus Business Edition to identify the viruses, worms, Trojans,…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Office 365 White Paper

    • 3872 Words
    • 16 Pages

    © 2013 Microsoft Corporation. All rights reserved. This document is provided "as-is." Information and views expressed in this document, including URL and other Internet Web site references, may change without notice. You bear the risk of using it. This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal, reference purposes.…

    • 3872 Words
    • 16 Pages
    Powerful Essays
  • Best Essays

    Individual Assignment 1

    • 2342 Words
    • 10 Pages

    Having a strong web presence is not only important in today’s world, it is vital for survival in today’s super connected world. Companies, banks, agencies and private industries must be able to create an environment to interact with customers, government officials and other companies in order to thrive. Opening yourself up to anyone through the Internet often means opening your system up to the world. Today we are more connected than ever, and cyberspace is littered with a multitude of individuals, some with the intent to compromise network confidentiality, integrity and availability. Anyone with a computer and Internet access can become a victim or criminal over the web. As a result, networks and servers are under constant attack these days. Attackers are changing their techniques daily and are on a never ended endeavor to disrupt companies for their selfish reasons. Two such forms of disruption are Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. These forms of disruption have cost companies millions of dollars and are showing no signs of stopping. That is why it is up to security professionals to create the best safeguards and impose efficient and proper techniques to prevent, mitigate and discover these attacks before they inflict terrible harm. In the following assignment, these important topics of prevention, mitigation and discovery will be discussed as they relate to DoS and DDoS attacks on today’s systems. Specifically, three academic journals have been selected that relate to this topic. This essay will first briefly summarize each article that was selected and state the methods of prevention, mitigation or discovery as they relate to denial of service attacks. The second part of this essay will explore in detail the specific methods discussed in the summaries as they relate to a proposed technique and practical…

    • 2342 Words
    • 10 Pages
    Best Essays
  • Satisfactory Essays

    On January 12, 2007, at 4:31 AM iPremier Web servers were brought to a sudden stop. They had been attacked with a denial-of-service (DoS) attack. A DoS attack is where a ton of packets consumer networking resources and cause a stand still. This stand still prevents customers from using online services. The…

    • 1712 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Starting working at my health risk assessment plan I ran into several major difficulties which forced me to make major adjustments. Goal of my plan is to reduce exposure to harmful noises which are higher than 85 dB. In order to differentiate harmful noises from normal ones I had to measure them. I used app on my phone to measure noise intensity in my car. However I could not find any way no measure noise intensity in my earphones, which I use at least 2 hours a day. So I decided to avoid earphones for the next several weeks. Another problem I have to deal with is resistance of my family members to lover volume in the car while driving. So I had to research topic even more in order to provide convincing argument regarding NIHL to my family.…

    • 176 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Risk factors are defined as the conditions or events that increase the chance of unwanted negative mental health outcomes. Protective factors are assets or resources that help to offset or prevent a negative mental health outcome. Throughout my life thus far, I have experienced several risk factors as well as several protective factors that shaped who I am today in terms of my mental health and well-being. The textbook also explains four mechanisms that help people deal with adversity and foster a good mental health and defines good mental health as the presence of cognitive, social and emotional functioning.…

    • 1765 Words
    • 8 Pages
    Powerful Essays

Related Topics