StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Threat for Information Technology - Research Paper Example

Cite this document
Summary
The paper "Threat for Information Technology" discusses unauthorized user action threat attempts or actions that are subject to action that may result in internet crimes. The lack of user authentication and the lack of a firewall system are the two vulnerability examples of this kind of threat…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.9% of users find it useful
Threat for Information Technology
Read Text Preview

Extract of sample "Threat for Information Technology"

1. Discuss the difference between a “Threat” and a “Threat Agent”. A “Threat” is anything that brings danger to an asset while a “Threat Agent” is an individual or group that spreads the threat.
2. What are the typical steps in the Risk Assessment Process? According to Edward, the typical steps in the Risk Assessment process are the following: System Characterization, Threat Identification, Vulnerability Identification, Control Analysis, Likelihood Determination, Impact Analysis, Risk Determination, Control Recommendations, and Documentation findings.
3. Provide four examples of physical security safeguards. Install antivirus software, make the room fireproof and earthquake-proof, back up the data, and continuous power supply.
4. Define/describe the concept of criticality as it relates to asset valuation. The concept of criticality as it relates to asset valuation is to show how important is the asset to the mission.
5. Briefly explain the difference between the qualitative and quantitative risk analysis processes. The qualitative risk analysis process is done through the use of questionnaires and workshops to calculate the relative values of assets while a quantitative risk analysis is done by assigning hard financial values to assets.
6. Why is it so necessary to have a diversified team with a variety of experiential and work-related backgrounds for the RA? It is necessary to have a diversified team with a variety of experiential and work-related backgrounds for the RA to be able to bring out their knowledge, experience, and understanding about the assessment and to respond effectively to new dangers as they arise.

7. a) Briefly describe how each selection below is a threat to a network and b) list two vulnerability examples that you would look for/interview for when researching each. Do not provide the same vulnerability for more than one threat.
1. Inadequate environmental controls.
The computer software will crash or will have system failure that results in software bugs, power failures, and malfunction of the system. The improper use of computers by humans and the system was not designed well are the vulnerability examples of this kind of threat.
2. Misuse of computer resources
They can create a serious risk to information security. Using unauthorized personal devices such as USBs on secure networks and passing secret information over nonsecure methods or systems to get information are vulnerable examples of this kind of threat.
3. Unauthorized communication alteration
This threat alters or removes information from files. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Na Research Paper Example | Topics and Well Written Essays - 500 words”, n.d.)
Na Research Paper Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1579291-na
(Na Research Paper Example | Topics and Well Written Essays - 500 Words)
Na Research Paper Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1579291-na.
“Na Research Paper Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1579291-na.
  • Cited: 0 times

CHECK THESE SAMPLES OF Threat for Information Technology

Physical Threat to Organizations Information Holdings

The role of technology has transformed from a validation tool to the center of the main business (Aoufi, 2011).... As technology has improved, people have also become more aware of possible threats of information theft, cybercrime, and other fraudulent activities.... From the paper "Physical Threat to Organizations information Holdings" it is clear that in an organization, there are several employees with different job duties.... Through the help of electronic countermeasures, access to information can be limited to specific users only....
14 Pages (3500 words) Essay

Three information technology topics

Marketing increases demand for information technology products and services.... information technology enhances the marketing environment.... The research delves on the on three information technology topics.... The research delves on the importance of blending marketing concepts and information technology.... Three information technology topics ... Sherry Turkle currently insists that robots and technology are made to serve the needs of the people, not the people serving the needs of the computers stating, “We deserve better....
7 Pages (1750 words) Essay

Discussion Thread 2- Using Technology to Manage Information

Discussion Thread #2- Using technology to Manage Information Date Discussion Thread #2- Using technology to Manage Information I work at a franchised convenience store and the information system used by my employer is the Point of Sales (POS) system.... Discussion Thread #2- Using technology to Manage Information Discussion Thread #2- Using technology to Manage Information I work at a franchised convenience store and the information system used by my employer is the Point of Sales (POS) system....
1 Pages (250 words) Admission/Application Essay

Three Information Technology Systems

Criminal Justice Three information technology Systems Abstract (100-150) Understanding how to successfully use technological systems is essential for the success of any police department in combating crime in their city.... Introduction In today's age of information technology and in the various designs of database creations, members of law enforcement find that knowing how to utilize any number of research techniques will greatly assist in finding information on criminals being sought for various crimes....
4 Pages (1000 words) Assignment

Human Factors and the Insider Threat

yber security is dealt with not only access to technology but also the understanding of the human user.... It has been a long debate that technology advanced and gives humans a better way of living but due to human behavior, most of the time the technologies are exploited, wasted and misused.... The paper "Human Factors and the Insider Threat‎" describes that the cyber attacks on the company are increasing, and there is a need to adapt the information security framework....
5 Pages (1250 words) Research Paper

The Analysis of the Information Communication Technology

Specifically, the paper will review the above through the following guidelines: NIST 800-30: Risk Management Guide for information technology Systems, NIST 800-53: Recommended Security Controls for Federal Information Systems and Organizations, NIST 800-39: Managing Risk from Information Systems: An Organizational Perspective and NIST 800-64: Security Considerations in the System Development Life Cycle.... Some of the many risks that are associated with information technology include, budgetary risk, program management risk, inventory risk, supply chain risk, investment risk, safety risk, legal liability risk, and security risk just to name a few....
5 Pages (1250 words) Assignment

Information Technology Threats and Security

From the paper "information technology Threats and Security" it is clear that The threats are explored like a virus, malware, malicious activities, etc.... The growing demand for dependency on information technology requires the high demand for the prevention of threats and improved security as McCarthy (2013) founded in his work on E-authentication.... After scanning if any threat is found it deletes that threat from the system....
6 Pages (1500 words) Assignment

Benefits that Information and Communication Technology Brings

The paper "Benefits that Information and Communication Technology Brings" is a perfect example of information technology coursework.... The paper "Benefits that Information and Communication Technology Brings" is a perfect example of information technology coursework.... The paper "Benefits that Information and Communication Technology Brings" is a perfect example of information technology coursework.... In this paper, we aim to provide an insight into similar such instances where information technology in organisations have outgrown their benefits....
5 Pages (1250 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us