IT Security is whereby the implementation and security measures are made according to an organizations security needs in order to protect different types of assets of the organization.
IT security management is the procedure that has been made to be able to prevent, detect and recover from threats that are trying to gain information from a system.
The security mechanisms of ITSM are:
The ITSM 3 main cores are:
And they are 2 other cores that aren’t discussed as much, these are:
Identify types of security risks to organizations; you should include examples from a range of different categories of threats
Evaluate the types of security risk to organizations, detailing which are more likely to occur and what the potential consequences to an organization are.
You should support your description with accurate, up-to-date information from reputable sources.
A risk a situation that will involve the exposure of danger. And a threat is when a person is likely to cause the danger. That will mean that the person who is causing the malicious acts, is the threat.
They are 4 types of threats, which are:
Research conducted by the US Computer Emergency Response Team (Cert) estimated that up to 40% of IT security threats are perpetrated from within the company.
Edward Snowden also known as the NSA whistleblower was a former CIA employee that worked for the government of the United States. In 2013 he stole sensitive information about global surveillance programs and leaked it online that caused mass panic around the world.
Source : https://en.wikipedia.org/wiki/Edward_Snowden
As the name suggests, these are threats originating from outside the organization. These threats are difficult to foresee hence making them difficult to counter.
Stuxnet is a malicious computer worm that was detected in 2010 that targeted Iran’s nuclear program. This was the first cyber-attack in history directly to the underlying infrastructure of a country. Speculations arose that the worm could’ve been a collaborated work of America and Israel but neither country took responsibility. The worm infected Programmable Logic Controllers (PLCs) by either increasing the speeds in the centrifuges causing them to overheat or decreasing them completely collapsing them.
Source : https://en.wikipedia.org/wiki/Stuxnet
Physical threats are another form of unpredictable threats such as fires, thefts or natural disasters. Nonetheless, they are capable of doing serious damage to information systems.
In 2011, the Northeast coast of Japan was hit by an earthquake of magnitude-9.0. It left only destruction along its path. The aftermath of the incident left companies such as Toshiba and Sony damaged after the loss of sensitive data. This not only affected Japan but all countries that have corporate relations with it. Despite all that, it was difficult to estimate the exact loss of data that was incurred during the incident.
Figure 3 – Burning oil refinery in Japan after the quake
Source :http://www.nytimes.com/2011/03/12/business/global/12yen.html?mcubz=3
Social engineering is the art of deception and manipulation of people in order to have them disclose confidential information. The type of information sought includes but not limited to banking data, passwords, and full control of root systems.
When it comes to security, it’s all about who and what to trust. It is much easier to coerce someone into giving their password than to try hacking it. People are more comfortable visiting malicious websites when asked by a friend or coworker.
When a person with malicious intent successfully infiltrates any one person’s email in a company or institution, they can use the contact list to send out malicious emails to the contacts. The receivers will be deceived into thinking that the email is from an acquaintance when in reality; it is controlled by the hacker.
These types of emails contain some form of link or file that the user is coerced into downloading or visiting. These emails prey on the curiosity of the human mind and are most commonly used by hackers.
This is one of the easiest ways to gain access to sensitive data although not the best if the targets are well trained. The idea is to create a similar website and send a link to the victim either through email or other means. The victim is deceived into believing that the website is legitimate and once sensitive data is entered, the attacker gains access.
Source: https://ucldigifest.org/course/phishing-and-social-engineering/
Worm is a type of malware that is self – replicating. Worms does not alter anything in your computer system, it is named worm because of its peculiar feature to creepily spread from one computer to another within the network of the infected computer system.
Unlike viruses, the worms will not attach itself to an existing program, instead they have an ability to spread themselves through the network or any external drives connected to the infected computer by easily attaching themselves. They can also automatically move through machines that are connected in the same network as the infected machine. They are three types of worms, email worms, instant messaging worm and file sharing network worm.
What makes them dangerous is that they do not require human interaction to spread and execute themselves on victim machines. They rely on the vulnerabilities of either the operating systems or unpatched software on the victim machine.
This one of the most complicated threats among all. This is a program that isn’t like a virus that is contained or installed by a malicious program. Sometimes a Trojan horse might be called a payload. Most of the popular threats in banking come from the Trojan family like Zeus and SpyEye.
The Trojan has the ability to hide itself from an antivirus detection and this assists them in easily stealing important data. In case the Trojan is extremely powerful than it can also take over the entire security system, this may result to many types of damages, which can start from your own computer to your online accounts as well.
Source: http://hackerdeepakbhardwaj.blogspot.co.ke/2014/03/how-to-protect-your-website-from.html
Botnet is installed by a BotMaster/BotHerder to be able to take control over all the workstations that have the Botnet Infection. A botnet is a group of workstations that are all connected to the internet and have been compromised by a virus or a Trojan horse. The individual workstation is known as a zombie computer.
The zombie workstations are all under the command of the BotMaster and usually perform the activities instructed by the Master. For example, the zombie workstations can disturb spams to the email contact addresses and become sufficiently large in number. This can then be used to access and target websites and spread as a DOS and bring down web servers. Google and Twitter have both been victims of DOS attacks.
Source: http://news.bbc.co.uk/2/hi/technology/8010729.stm
A keylogger is usually a sub function of a Trojan horse, which will keep a track of every key you press on the keyboard. This is a powerful threat which is usually used to obtain or steal login credentials like the username and passwords of users.
Source: https://www.lastline.com/labsblog/detecting-keyloggers-on-dynamic-analysis-systems/
This is a general term which is used to describe many types of software’s that can affect your computer system.
Source: https://securityintelligence.com/mobile-malware-why-fraudsters-are-two-steps-ahead/
The DOS and DDOS is a very easy to send to a computer. The DOS makes a connection to a service port and sends requests to the computer. If a computer can handle 20 requests per second, the DOS will send 50 requests per second and this causes the host computer to be unable to identify the difference between the fake requests and the real user requests.
This is basically like a trick that is put into your system that informs you that you have so many infections which are apparently not even there and it makes you buy a very useless anti malware program which claims that all threats are eliminated even though they were no threats. It is used to scam people out of money by scaring them to buy the anti-malware program.
Source: https://slcc.service-now.com/help/kb_view.do?sysparm_article=KB0010584
Spamming is also known as IP Spoofing, this will pretend to be an IP of a specific network and create the illusion of being a valid IP address by creating IP packets will be disguised as genuine with the intentions of harming the actual owner of that specific IP address in the network. The IP
Source: http://blog.analytics-toolkit.com/2015/guide-referrer-spam-google-analytics/
This is a form of software that has been programed to specifically attack certain vulnerability in the system. For example if a browser has vulnerability like out of date flash plugins then an exploit can work on the browser and plugin.
Source: https://blog.barkly.com/how-ransomware-infects-computers
Cookies are used by most of the websites, the cookie will store things onto your computer to be able to keep track of the activities that are done within their website.
Source: https://catalog.flatworldknowledge.com/bookhub/5227?e=collins-ch15_s06
A virus was a really popular 10 years ago. The virus is a malicious program that will replicate itself and will only destroy a computer. The virus was only made to destroy the computer system beyond repair or can’t be able to operate properly.
The virus today is only used by very few individuals. The virus can be used to destroy your data but they usually need a human / host to spread the virus from one system to another, even if the user is unaware they are spreading the virus.
Spyware is a type of malware that has been designed to spy on the computer is has infected. Once your machine is affected by spyware, it will keep track on the activities performed by the user and will find a way to contact the host. After knowing all your activity, the host of the spyware makes scams to cheat on your money. The most common spywares are Gator, Bonzi Buddy, 180 Solutions, XXXDial, Euniverse, CoolWeb Search, Cydoor, Xupiter and many other.
Source: https://www.cs.bham.ac.uk/~mdr/teaching/modules03/security/students/SS1/handout/handout.html
This is a threat, in which the computer starts having pop ups of a lot of advertisements. The adware can make the host any some money, when the pop ups come up in the infected machine. This is not a really harmful threat, but this can be pretty annoying. The adware is embedded into a software without the user of the machine being aware. Adware is mainly used in softwares that are disturbed for free. The advertisement is a working interface and can often gather and transfer personal information of the user to a distributor person.
Source: https://blog.stopad.io/2017/08/31/what-to-do-if-your-ad-blocker-isnt-blocking-ads/
This uses a Trojan horse to take control over a victims browsing session. This threat can be extremely dangerous especially when the victim is sending money via an online banking account because this will be a perfect time for the hijacker to change the destination of the bank account and even how much money is being sent.
A mousetrapping is a malware that will trap your web browser onto a particular website. No matter what you do it will open onto that website only. If you go forward, backward, type in another website or even restart the browser, you will be redirected onto that website.
The SQL Injection is a malicious code that is made only to target a SQL server or a database to be able specifically obtain the valuable information that is stored in it. This is an unauthorized access attack in order to obtain valuable information.
Source: https://www.w3resource.com/sql/sql-injection/sql-injection.php
The man-in-the-middle is the among one of the most dreadful threat, which is an intrusion being established on an independent connection whereby both sender and receiver are infected. All the messages are intercepted and modified, it takes place so smoothly that both of the individuals are not aware that someone is overhearing the conversation and this can also expose the whole network to several other threats.
Source: https://www.cs.uic.edu/~jbell/CourseNotes/OperatingSystems/15_Security.html
A root kit is used to obtain administrator level access to a computer or to a network with the collections of tools that it has. The rootkit can easily be installed by exploiting a vulnerability in an application and it may contain a spyware which is bale to monitor and record all your keystrokes.
This is a new type of malware. This is a malware that is installed onto your system and starts making all your files unreadable. The host of this malware is holding your entire data hostage until you pay the host a ransom for all your data. The ransomware can be delivered by a virus or worm and there is no guarantee that after you pay the ransom, that the data will be restored.
The most recent and devastating attacks of 2017 was probably the WannaCry ransomware. This malware target machines running Microsoft Windows operating system by encrypting data and demanding ransom payments in the Bitcoin currency1. Although the vulnerability exploited by the malware was not a zero-day2 flaw, it still affected several machines. It spread itself across the network without human interaction by exploiting the Server Message Block (SMB) port. The attacks could be prevented by patching the SMB port. Estimated number of victim machines were up to 300,000 worldwide. In just a few days, essentials in daily life were interrupted including but not limited to hospital equipment such as MRI scanners in Scotland and Wales.
Figure 20 – WannaCry screenshot after infecting victim machine
Source : https://en.wikipedia.org/wiki/WannaCry_ransomware_attack#Impact
Valuate organizational security procedures
You should write a report for a thorough risk analysis of the microfinance I.T. (systems, network, databases, web system, wireless system, etc.) You should refer to industry good practice and reference examples of procedures being used elsewhere.
The organizational security procedures are laid out to be able to provide a secure platform for all the users. To prevent most of the threats, the main procedure of the company will be:
To avoid an exploit, the software’s are required to be up-to-date so that all patches are done and the vulnerabilities can be fixed.
A cookie can be easily rejected by the browser you are using. This will remove the existence of the cookie.
To make sure that you do not have any adwares, you can use the following tools:
You can never get out of this threat unless you remove the browser containing it.
The best ways to be able to protect the database is to:
Discuss risk assessment procedures
You should explain what is risk assessment, its importance, why organizations need to carry out and the steps/procedures followed when carrying out a risk assessment procedure
Risk assessment is where by the hazards or negative impacts that affect a company are identified. The assessment will give an in depth analysis on how much damage each risk can do to the company and how to reduce the impacts to the company’s’ operations.
The risk assessment has become an important process in computing because it is the form of an integral part for the health and safety plan of the company. The risk assessment assists in:
In todays world a risk assessment has become a necessary tool for a company. The risk assessment ensures the safety of all assets of the company in case of any danger around the place. The risk assessment will ensure that almost all hazards have a control measure in place.
For example, in case a fire breaks out in the company, the company already has a control measure on how to evacuate the building and has a fire point to ensure that everyone from inside is safe. The fire department request companies and individuals to do fire drills to train all the people of the company to be able to evaluate calmly and in an orderly manner and each company is required to have fire Marshalls (are trained to put out fires and assist others in case of a fire, they wear a neon vest on top that stands out and helps evacuate everyone on time), fire extinguishers and other control measures are taken.
Just like the example above, the company has to keep control measures for all hazards that have been identified in case of any of them arising in the near future, thus making a risk assessment a very crucial step to take, in order to keep all assets safe in case of a threat.
There is a risk assessment framework that will make it very easy for a company to prioritize the assets and easily keep records of all assessments. The risk assessment is done according to the type of business and industry the company falls under and the laws of compliance are considered as well. But the risk assessment stages still remain similar and can be followed for almost all types of businesses.
The main questions asked during a risk assessment are:
The main aims of a risk assessment are:
Stage 1 – identify threats, risks and vulnerabilities
The risk assessment stage 1, is about the different types of negative impacts that can affect the and to determine the negative impacts, the following things are done:
A risk is assessed and priorized then managed
Stage 2 – risk evaluation
This is the stage in which we discuss the ways in which we can prevent or protect assets from the threats and hazards listed above.
Evaluate data protection processes and regulation as applicable to an organization
Comment on legislation and best practice guideline that will affect the choice of data protection processes and explain their importance in determining the processes that will be adopted
Data protection is when the data of an organization is protected and has legal controls on the access of the set data.
ICT legislation is a computer crime growing industries that causes a lot of money to be lost yearly due to computer misuse and fraud. Legislation is a law that has been passed by the government.
The purpose of ICT legislation is to protect confidentiality of information stored about an individual. To provide ways for people to seek court action if the rights have been violent. To minimize the effect of exposure to uncensored material. Observe copyright for those who create software.
A ICT policy outlines how the ICT strategy will be put into operation.
What is the impact of legislations on these policies – Legislations will affect the content of ICT policies. E.g. the writing of the security policy will be affected by the computer misuse act. The acceptable use policy will be affected by the health and safety act.
This act was implemented by the EU Directive to protect anyone who processes personal data. The data act 1998 replaced the data act 1984 of UK. The main purpose of this regulation is to control the path of the information and how it is handled. This gives the legal rights to individuals to store personal information. The data act has 8 principles for the control of personal data storing and processing, which are:
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more