Monday, December 30, 2019

Risk And Security Security Risks And Protection - 726 Words

Security risks and protection Security Risks Hacking: Hacking is where unauthorised user’s try to exploit the weaknesses that your computer may have and in the internet software. A hacker can either alter and then break down the links on the website or add additional files and viruses to the webpages. By altering and breaking down the links on the website, the users won’t be able to access certain parts of the website. Also by adding additional files and viruses, this means that it will take longer for users to download the files that are on the webpages. Viruses: A virus is a piece of malicious code that copies itself into another program, computer boot sector or document which changes the way the computer works. A virus can be spread†¦show more content†¦Distributed denial of service (DDOS): A DDOS attack is when computer systems attack thing like the server, website or other network resource. The incoming messages/connection requested/ malformed packets then flood the systems making it slow down, crash or shutdown. Security protection Firewalls: A firewall is a security network that can be either hardware or software or a combination of both. A firewall protects your personal information and computer by acting as a barrier so that viruses or unauthorized internet users from accessing your information. In relation to the website performance, a firewall is used to protect the website and your computer from users that are not authorised to access it and to stop hacker from manipulating the websites code. It also will prevent your website from being infected with viruses or bugs which will make the website take longer to load. Secure socket layers (SSL): Secure socket layers is a network protocol that is used to securely connect network application clients to the server using an insecure network over the internet or internal network. An example of this is connecting a web browser to a web server. This makes the web address HTTP to HTTPS which is more secure. In relation to the website performance, SSL can slow down the time it take to load the webpage. The reason for this is before the website is loaded the client need toShow MoreRelatedHuffman Trucking Benefits Election System Risks1200 Words   |  5 PagesHuffman Trucking: Benefits Election System Security Lisa M. Gardner CMGT442: Information Systems Risk Management March 19, 2012 Craig McCormick Huffman Trucking: Benefits Election System Huffman Trucking Company has requested a new Benefits Election System to be implemented within the organization. The current benefit packages include medical, dental, and vision plans for employees. For the BenefitRead MoreIs20071634 Words   |  7 PagesISO27001security.com Version 1 28th November 2007 0 INTRODUCTION 0.1 WHAT IS INFORMATION SECURITY? 0.2 WHY INFORMATION SECURITY IS NEEDED? 0.3 HOW TO ESTABLISH SECURITY REQUIREMENTS 0.4 ASSESSING SECURITY RISKS 0.5 SELECTING CONTROLS 0.6 INFORMATION SECURITY STARTING POINT Information security is defined as the preservation of confidentiality, integrity and availability of information †¦ Information security is defined as the preservation of confidentiality, integrity and availability of informationRead MoreSystem Security Controls : Table 1 System Compliance Essay1045 Words   |  5 PagesSystem Security Controls Table 1 System Compliance NIST 800-53 Control Family Number Met / % Number Partially Met / % Number Not Met / % Number N/A / % Control of system and Information Access (AC) Training Awareness (AT) Audit Accountability (AU) Assessments of Security, Certification Accreditation (CA) Management of System Configurations (CM) Contingency Planning (CP) User Identification and Authentication (IA) Incident ResponseRead MoreSecurity Standards And Security Safety Standards812 Words   |  4 PagesGovernment Security Standards The government and organizations are to comply with security laws and regulations in order to fully operate and maintain protection of information systems. Some of these security laws and regulations may vary for every industry and with some organizations; however, implementing security standards with a broad in scope provides reliable reasonable security. In many cases reasonable security implemented throughout the information system can include a high-level of protectionRead MoreHuffman Truckings Request for a New Benefits Election System1161 Words   |  5 Pagesmethod, security measures need to be implemented to protect employees privacy and information as well as preserve company assets from theft and/or litigation. Huffman Trucking Huffman Trucking has implemented such a system called the Benefits Election System, which assists management in tracking and reporting employee benefits (University of Phoenix, 2005). This paper will examine the security risks and requirements of the Benefits Election System of the organization. Security RequirementsRead MoreThe Current Service Level Agreement1223 Words   |  5 PagesManagement, LLC, Datanal Inc, and Minertek, evidence was found that security standards necessary to protect all parties were not addressed within the body of document. The following information technology security standards are recommended to protect all parties involved and should be applied to the SLA in this case. For Finman Account Management, the chief concern is to provide guidelines within the SLA that address data protection, authorized use, sharing of data, and retention/destruction ofRead MoreEssay about Responsibilities of Personal Protection1225 Words   |  5 Pagesof Personal Protection To understand the responsibilities of personal protection one must first understand what personal protection is. Once this is established one can begin to discuss the responsibilities and duties of personal protection, the rationale for personal protection, and finally, the history, and evolution of security and personal protection. Personal protection is important in the security industry and a profession that continues to change and evolve. Personal protection protects individualsRead MoreWEEK TWO CMGT 400 INDIVIDUAL ASSIGNMENT Essay1436 Words   |  6 Pagesï » ¿ Common Information Security Threats involving Ethical and Legal Sally Lowe CMGT 400 January 19, 2015 Kell, David Common Information Security Threats involving Ethical and Legal Technologic advances occur at a rapid pace, with new devices coming out at frequent intervals. These new devices are appealing to college students who want to do everything as quickly and easily as possible. Because of the numerous smartphones, tablets, and laptops used by students and employees, college campusesRead MoreThe Function, Motivation And Purpose Of The Nist Cybersecurity Framework845 Words   |  4 PagesFramework (CSF) (10 points). Describe in detail the five components of the CSF core (20 points). Explain why it is important for network security engineers to be aware of the CSF and similar security industry related disciplines (3 points). Motivation: If we consider any nation, its most vulnerable if its financial and economic security is compromised. Cyber security has a profound impact on a nation by making it susceptible to outside threats. It can have a drastic effect on a Nation’s wealth, militaryRead MoreData Processing Systems And Storage1371 Words   |  6 Pages Information Security refers to the characteristics and conditions of data processing systems and storage, to ensure confidentiality, integrity and availability. Consider security aspects means a) know the danger, b) classify and c) protected from impacts or damage in the best way possible. This means that only when we are aware of potential threats, aggressors and their harmful intentions (direct or indirect) against us, we can take appropriate protective measures so that it is not lost or damaged

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.