Friday, August 23, 2019
RCP 1 End of Chapter 1 H.W Assignment Example | Topics and Well Written Essays - 1000 words
RCP 1 End of Chapter 1 H.W - Assignment Example The companyââ¬â¢s network comprises of the basic information security measurements; the C.I.A triangle. This is another assumption because all network security companies rely on this triangle as fundamentals of their business. Confidentiality, integrity and availability are the prime reasons why clients trust backup companies like Data Mart with their confidential information. An example of how Data Mart protects its data from untrusted network is shown in this diagram; The main asset category at Data Mart falls under intellectual assets, be it their staff or the company information they store in their 200 rack mounted servers. The assumptions are that the company has a simple setup of a typical backup protection company that offers additional services of data analysis. Here is a brief list of organizationââ¬â¢s assets; Data Mart faces all those threats that can damage its data or somehow compromise its integrity that the customers trust it with. Network connections create the possibility of spilling problems due to an exogenous or endogenous attack that depends on the profile of security investments (Acemoglu, Malekian, & Ozdaglar, 2013).à Here are some specific threats that Data Mart faces; Bypassing the access controls is one of the favorite attacks. Making educated guesses about passwords or trying every possible combination of numbers and letters makes them finally guess the right password. In a denial-of-service (DoS) attack, the assailant sends a number of requests to the target. So, numerous requests are made that the system cannot appendage them. The system can crash or it may just be unable to accomplish different functions. In Distributed Denial of Service (DDoS) the attacker(s) launches an integrated number of requests against an entity from numerous locations simultaneously. These threats include Trojan horses, viruses, worms, active web scripts etc. meant to destroy of steal
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.