StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Potential Malicious Attacks in ACME Inc - Assignment Example

Cite this document
Summary
In the essay “Potential Malicious Attacks in ACME Inc.” the author discusses malicious attacks, which occur when wireless LAN technology is employed in the system network without proper data protection and/or authentication between access points and clients…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.1% of users find it useful
Potential Malicious Attacks in ACME Inc
Read Text Preview

Extract of sample "Potential Malicious Attacks in ACME Inc"

Potential Malicious Attacks in ACME Inc. Potential malicious attacks that could be carried out against the network and organization. 1. Administration Attacks can occur when: There’s no encryption of passwords in transfer Configurations are not kept and no back-up s in place for network devices Passwords exist for an indefinite period on devices used in the network Weak administrative access controls are used There’s sharing of passwords on devices Negligible flow of data control is utilized (e.g. minimum use of virtual local area networks, virtual private networks, or access control lists) 2. Hardware Attacks on hardware can occur when: Non-critical staff has physical access to hardware equipment No definite security perimeter has the system is in place defining access points that must be secured There is insufficient physical security of network equipment 3. Wireless Connections Malicious attacks occur when wireless LAN technology is employed in the system network without proper data protection and/or authentication between access points and clients. The potential impact of malicious attacks When a malicious code attack happens, the main target on restoring operations as quickly as attainable sometimes overrides the will to gather knowledge on the direct prices to respond, the loss of productivity, or different kinds of impact that a malicious code attack has on a company. However understanding the prices related to malicious code attacks and also the impact that attacks will wear their organizations is what allows managers to form choices on what quantity to speculate in countermeasures. Although the methodology needed to trace time expenditures and corresponding value for a company is simple, a decline in productivity could result from a malicious code attack: • Immediate economic impact will embody harm to systems that needs human intervention to renovate or restore, interruption of business operations, and delays in transactions and income. • short economic impact will embody loss of contracts with different organizations in provide chains or the loss of retail sales, negative impact on associate organization's name, and hindrance to developing new business. • long economic impact will embody a decline in market valuation and/or stock worth, erosion of capitalist confidence, and reduced goodwill price. Decreases in productivity of workers or delays so as process or client service responses are often tracked and calculated by department managers. Experience shows that department managers might balk at the request for such knowledge as a result of they're therefore targeted on obtaining operations running swimmingly once more after associate attack. One rational motive that managers will use with people who might resist is that the info they supply can facilitate confirm what quantity ought to be spent on defensive measures so as to cut back the likelihood of future attacks. Proposed security controls against potential malicious attacks Adopting a diverse computing atmosphere offers important security worth for a few enterprises. Include the impact of recent worm attacks in the concerns of desktop software package decisions. a straightforward way to begin this method is to maneuver the setting organization that don't directly support the operating system desktops which don't need applications that area unit solely supported on OS onto an alternate software package or systems. Therefore, in case a malicious-code attack strikes, the desktops that run the choice systems will perform and may scale back the scope and period of the attack. Potential concerns for data loss and data theft Hackers will access networks that don't seem to be properly secured, thieves may gain entry to the workplace and steal instrumentality or employees may carry the information out of the workplace on moveable media. External threats by hackers are expected and also the risks may be reduced through the safety measures mentioned on this web site. Internal threats are harder to anticipate however may be equally devastating to your business. Employees could take away information unwittingly or deliberately for gain or revenge. Data can be taken out of the workplace in USB drives, writable CDs or DVDs, mobile phones or MP3 players. These devices can all hold giant amounts of data that may be a discreet means within which unauthorized persons may copy data. Security controls for data loss and data theft Conduct a risk analysis as part of the organization’s security planning. Create a plan for how to check, identify and counter cases that may occur. Develop personal user accounts for all employees with access the network staff in order to allow control in terms of who can gain entry to the firm’s data by limiting access to files, drives and folders to particular user accounts. Create clear policies for staff accessing the computer network. Train staff on how to handle data that is confidential. Implement access and use policies that summarize the penalty for breaches of the policy to make staff take them seriously. The policy covers: • How differing kinds of information and specifically lead ought to be treated, as well as restrictions on emailing information • use and security of passwords as well as protection access once faraway from the table and work off at the top of the day. • Rules on software installation and computer code • Rules on storage of personal files like video or music on computers • Use of remote access, notably securing instrumentation and or the affiliation from • Who will access business instrumentation and/or information • Details of any watching activity you may undertake, if any • working from home, if allowed, notably secure transfer and storage of information in an exceedingly home setting • Penalties of breaching the policy. (Hill, 2009; Roebuck, 2011; Stewart et al., 2012). References Hill, D. G. (2009). Data protection: governance, risk management, and compliance. Boca Raton, FL: Taylor & Francis. Roebuck, K. (2011). Data loss prevention (DLP). Lexington, KY. Stewart, J. M., Chapple, M., & Gibson, D. (2012). CISSP. Hoboken: John Wiley & Sons. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Potential Malicious Attacks in ACME Inc Assignment”, n.d.)
Potential Malicious Attacks in ACME Inc Assignment. Retrieved from https://studentshare.org/information-technology/1643649-acme-inc-draft-report
(Potential Malicious Attacks in ACME Inc Assignment)
Potential Malicious Attacks in ACME Inc Assignment. https://studentshare.org/information-technology/1643649-acme-inc-draft-report.
“Potential Malicious Attacks in ACME Inc Assignment”, n.d. https://studentshare.org/information-technology/1643649-acme-inc-draft-report.
  • Cited: 0 times

CHECK THESE SAMPLES OF Potential Malicious Attacks in ACME Inc

Detection of Attacks Executed by Multiple Users

Detection of attacks executed by multiple users [Name] [Date] The problem of network attacks detection is of crucial importance nowadays.... hellip; To prevent, foresee and detect mass attacks is one of the primary tasks of the modern programmers.... Online interaction attacks should be prevented and suppressed once they are detected.... These challenges and problems in the computer and the Internet world are intensified by the existence of mass-attacks of users....
3 Pages (750 words) Dissertation

Attack Plan on Goodwill Industries International

Computer networks are vulnerable attack and it is wise to consider those weak points in order to prevent attacks that can have disastrous consequences.... Possible attacks As Goodwill must keep a system of donor records, these lists are readily available inside its network.... Attackers can also infiltrate donor information with malicious code, which would disable the ability of the organization as a while to access valuable information.... This could be as a result of simple malicious behavior, or because the individual holds a grudge of some sort against the company....
4 Pages (1000 words) Essay

Wireless Network Active Attacks

John Wiley & Sons, inc.... There are also many other forms of the man in the middle attacks that exploit the fact that most networks communications do not use a strong form of authentication.... Denial of Service attacks at the MAC Layer in Wireless Ad Hoc Networks.... It is the malicious efforts of a persons or number of persons to stop a web site or service from carrying out proficiently or at all....
2 Pages (500 words) Essay

Viruses and Worms

The modern technology and programming techniques have massively helped computer programmers and hackers to write malicious code to bring devastation to computer system.... In this report the researcher also have presented types of viruses and worms, techniques of dispersion, their potential harm to the computer, possible protection techniques and afterward methods of removal of computer viruses and worms.... With the passage of time we are expected to have deep knowledge of computer viruses and worms and their potential influences on computer technology....
9 Pages (2250 words) Research Paper

Reverse Social Engineering Attacks in Online Social Networks

The writer of the essay "Reverse Social Engineering attacks in Online Social Networks" suggests that in order to minimize the effects of RSE, the networking sites should only suggest possible friends when there is a strong connection that exists between them.... In the study, a single account was initiated which performed a large number of email search queries, the profile was then recommended by the site suggestion system to multiple profiles as a potential friend and as a result, thousand friend requests were received by the account....
4 Pages (1000 words) Essay

GSM Phone Security

The writer of the paper “GSM Phone Security” states that there are specific attacks that can be done on the GSM phone.... There are however countermeasures that can as well be taken to try and prevent these attacks or at least limit the attacks for that matter....
10 Pages (2500 words) Coursework

Business Data Communication and Networking

The paper "Business Data Communication and Networking" supports the argument that common security flaws for network design is also depending on users to deploy security patches.... Network deployments are currently adapting the use of WSUS to patch network workstations.... hellip; WAN Star network layout by its nature becomes the most common computer network design....
5 Pages (1250 words) Coursework

Mitigating the Threat of Malicious Insiders

nbsp;Any disruptions or attacks on a businesses' information system can be disastrous in terms of legal costs, customer loss, and loss of profits.... nbsp;… In today's digital age, most businesses rely on information systems that are under constant threat of attacks.... Based on the history of malicious insider attacks there are numerous threats that have already been reported.... The following paper "Mitigating the Threat of malicious Insiders" aims at discussing the numerous ways of mitigating the threat of malicious insiders....
5 Pages (1250 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us