This website uses cookies to ensure you have the best experience. Learn more

Identifying Potential Malicious Attacks, Threats And Vulnerabilities

1145 words - 5 pages

Multiple of organizations have gone to great lengths to make sure their networks are fully functioning correctly because it is the best way to facilitate information being shared and distributed as well as keep sensitive information secured. Organizations will eventually become exposed to potential malicious attacks and threats over a period of time. One of the potential threats to any organization is internal threats, which is a disgruntled employee that knows how the organization they work for operates. They already have some sort of access to a computer system in order to cause the most damage to an organization for a specific reason by putting a virus, Trojan horse, or a worm inside the ...view middle of the document...

These malicious attacks might also disrupt an organizations service in order to gain a competitive edge over them because the world thrives on competition to be successful (Microsoft, n.d.).
The best thing to do that will protect against these potential malicious attacks is to consider implementing multiple security controls. The first security control will be Inventory of Authorized and Unauthorized Devices, which will only allow authorized devices to have access to an organizations network, and unauthorized devices that many external attackers use to try to gain access to an organizations network will be prevented. The second security control will be Inventory of Authorized and Unauthorized Software, which manages all software on the network to scan for unauthorized software in order to prevent it from being installed and executed, so attackers won’t be able to compromise an organizations network with malware programs to take control of it. The third security control will be Continuous Vulnerability Assessment and Remediation, which will be able to identify vulnerabilities, remediates, and minimizes the opportunity for attackers to exploit any vulnerability when organizations have new information (SANS Institute, n.d.). The fourth security control will be Malware Defenses that will enable updates frequently to detect and prevent against malicious software that is trying to spread in a network (Bradley, 2013). The fifth security control will be Application Software Security, which will acquire the appropriate software that doesn’t have vulnerabilities that could be found in web-based and other application software that attackers will exploit when an organization uses it. That way an organization will be able to prevent, detect, and correct all security weaknesses that an organization might have. The sixth security control will be Controlled Use of Administrative Privileges, which will prevent attackers from having the advantage of administrative privileges to an account that will target computers, networks, and applications in order to have full control over them (SANS Institute, n.d.). The last security control will be Account Monitoring and Control, which will prevent disgruntled employees or former employees from having access to their accounts after they were fired or laid off from their jobs. Disgruntled employees or former employees won’t be able to steal an organization’s sensitive information for malicious...

Find Another Essay On Identifying Potential Malicious Attacks, Threats and Vulnerabilities

Vulnerabilities and Potential Improvements in China’s Crisis and Recovery Management Policy via Case Study on 2008 Wenchuan Earthquake

902 words - 4 pages ? Possible suggestions for the Master Plan China has been making great efforts in disaster risk reduction Through the analyze of the vulnerabilities in the China’s crisis response and recovery management policies, several improvements can be taken to enhance the effectiveness and efficiency of the rescue and recovery operations for the coming natural disasters. Risk Reduction: Disaster Response Plans and Preparedness Improvement at All Levels: As for

Information security Essay

2954 words - 12 pages 5.3 Vulnerability Vulnerability is commonly associated with the inability to withstand the effects of a hostile environment. Meanwhile, in computing field, vulnerability is defined as unintended flaw in software code or system that open to potential exploitation from outsider. There are several forms of exploitation such as unauthorized access to the system, malicious attacks using worms, viruses, Trojan Horses, and more. The exploits in

Team Dynamo

817 words - 4 pages robust security assessment tool commercially available through website downloads. The Acunetix tool’s key features include port scanner, HTTP sniffer, SQL injection tool, and a penetration tester capable of identifying a variety of potential website vulnerabilities including susceptibilities to buffer overflow and cross-site scripting (XXS) attacks (Acunetix, n.d.). Similar to the Acunetix web scanner, the QualysGuard Freecan tool is also a robust

Technical Project Paper

2157 words - 9 pages local community due to the loss of employment and decrease in revenue for the local tax authority. We will attempt to identify all potential vulnerabilities that may exist in our network. The entire system is vulnerable to much risk and each resource needs to be reviewed and a risk analyses needs to be completed to determine our vulnerabilities. Some of the potential malicious attacks that may be carried out against our network include

Hacking as a Means of Identifying Weaknesses in Computer Security

1651 words - 7 pages The use of hacking can be very beneficial as a means of identifying weaknesses in computer security. Nowadays, numerous companies and governments use this technique to assess the level of security of their systems and determine if any valuable information is at risk of being accessed unlawfully. Ethical hackers are employed to identify potential threats on a single computer or a whole network of computers. The found potential exploits are later

Web Vulnerabilities Paper

2243 words - 9 pages , defacing of websites can occur, and the attacker can even redirect users to other malicious sites. Cross-site scripting can occur in two ways… When data enters a web application through an untrusted source Dynamic content is sent to a web browser without being filtered for malicious content There is vast flexibility in cross-site scripting attacks that makes it so effective and hard to prevent. The data can contain malicious content in various

SCADA Attacks

836 words - 4 pages training, and the affects of not paying attention to user policies. The failure to conduct cyber attack scenario drills can be correlated to a vulnerability. Rehearsing crises management practices can improve a cyber security posture within the energy industry (Laing, Badii, & Vickers, 2013). It is not difficult to conclude that attacks on SCADA systems are susceptible to vulnerabilities in the energy infrastructures. Through the course

User Vulnerability in Cybesecurity

1863 words - 7 pages Introduction It should not be a surprise that the biggest vulnerability in Cybersecurity is the user (Goldman, 2010). The vulnerabilities presented by the user fall into two general categories: (1) accidental and (2) malicious. Vulnerabilities are important to those that are trying to perform unauthorized actions on an information system. For this paper, the term information system is being used generically to be anything from a home

Security in the Computer World

1434 words - 6 pages vulnerabilities, can make codes to exploit a system. External threats are generally given by individuals working outside of a company. Internal threats- possessed by someone who is working inside of that particular organization. Symantec issued brief report about major causes of data breaches in a company. The root causes were due to malicious attack which contributed to 37 percent while negligence and system glitches were 35 and 29 percent

Vulnerability assessment of the company system and recommendations on measures to mitigate or eliminate potential risks

1214 words - 5 pages how they operate and the vulnerabilities or risks that they can address in the protection of passwords. Rouse (2006) refers to this step as the identification of potential threats to each resource. 2.2.1.7 Run vulnerability scans Vulnerability scans can be run after understanding and mapping out company network infrastructure, applications, data flows and hardware, including security or protections needed . A security company that is well

Wireless LAN Benefits and Applications

1993 words - 8 pages disadvantages related to utilizing any wireless network may be: Security concerns, Range, Reliability as well as the Speed. Wireless Vulnerabilities, Threats and Countermeasures Wireless networks basically comprise of some prime components as discussed: The first one is the transmission of the data utilizing the radio frequencies; Next is the access points which provide the connection to organizational networks as well as to the devices of the

Similar Essays

Identifying Potential Risk, Response, And Recovery

1817 words - 7 pages With identifying potential malicious attacks, threats, and vulnerabilities, measures need to be taken to deal with the malicious activities. A strategy is needed to deal with each of the risk of the malicious attacks and threats in the previous memo. Also controls will need to be setup to help mitigate those risks of the attacks. A strategy and controls need to also be setup to mitigate each of the vulnerabilities from the previous memo to help

Identifying And Preventing Potential Rampage Killers

1099 words - 4 pages Identifying adolescents and young adults with serious emotional and mental issues and giving them access to the appropriate services is crucial to stopping rampage killers. The majority of troubled youth will never commit horrific crimes. However, all rampage killers showed some signs of needing intervention. More focus needs to be placed on the emotional and mental needs of our youth to prevent tragedies such as rampage killings. Parents need

Ppisql: Prevention And Precisely Identifying Sql Injection Attacks

558 words - 3 pages characterizes with unsafe manner, therefore; there is a possible to find a vulnerable in web application, which knows SQL Injection Attack (SQLIA). To illustrate that, if user supplied data is not properly validated, then user can modify a malicious SQL statements and can execute arbitrary code on the target machine or modify the contents of database. One of the reasons for SQLIA is that websites have databases, which include important, personal, secret

Starbucks Identifying The Corporate Missions Industry Structure Swot Analysis Core Competencies And Competitive Advantage Strategy Recommendations Potential Fallout

3451 words - 14 pages world. In SWOT analysis there are two factors which is Strengths and Weaknesses are internal factors of the any organization and Opportunities and Threats are external factors.StrengthsStarbuck's coffee company is a very profitable organization, excess earning of $10 million in 1988 and more than $1.3 billion ten years later and by 2007, this company earned $9.4 billion in revenues through a network of more than 15,000 stores worldwide.The number of