StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security Threats and Defenses - Essay Example

Cite this document
Summary
The techniques in use are based on cognitive biases, which are attributes of man decision making. Social engineers are aiming at exploiting these biases by creating attack techniques. Consequently, every company is at a…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.5% of users find it useful
Security Threats and Defenses
Read Text Preview

Extract of sample "Security Threats and Defenses"

Security Threats and Defenses Need for security measures. Social engineering has caught on among many professionals. The techniques in use are based on cognitive biases, which are attributes of man decision making. Social engineers are aiming at exploiting these biases by creating attack techniques. Consequently, every company is at a risk of being attack by one of the many techniques in use.Preparing employees to recognize and respond to social engineering techniques will at help to protect the company in many ways, which include:1.

Use strong passwords.By using strong passwords in the computer network, they will protect the company from against unauthorized access to company’s confidential information and identity theft.2. Protecting confidential informationThe employees will not only learn about the importance of protecting information but will also familiarize themselves with laws and policies which strongly prohibit sharing of confidential information such as passwords to computers.3. Making sure that virus protection s up to date.

This will protect the company from losing valuable data and information due to virus invasion.4. Others include being wary of suspicious mails, using secured applications and backing up data.As the level of technology advances, social engineering techniques in use are advancing to. These techniques include:1. PhasingThis involves obtaining private information fraudulently. The victim receives communications via emails from legitimate institution such as a bank. The mail comes with a form requesting for many details including ATM’s card PIN.2. Interactive Voice ResponseThe victim required to verify some information and directed to call the bank via a free toll number.

The login will be rejected severally ensuring the victim keys in passwords multiple times.3. Diversion theftThis is a trick exercised by professional thieves to con companies. It persuades the responsible person for deliver to deliver it elsewhere.4. PretextingPretexting aims at engaging a victim in a manner that leads to the victim divulging information or engage in activities which he/she could not be involved in under ordinary circumstances.5. Shoulder surfingSome social engineers will take advantage in public places such as cyber cafes.

They memorize access codes after looking over someone’s shoulder ( Basole, 2008 ).ReferenceBasole C.R. (2008). Enterprise mobility; applications, technologies and strategies. Amstadam ; IOS press.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security Threats and Defenses Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Security Threats and Defenses Essay Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1621010-security-threats-and-defenses
(Security Threats and Defenses Essay Example | Topics and Well Written Essays - 250 Words)
Security Threats and Defenses Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1621010-security-threats-and-defenses.
“Security Threats and Defenses Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1621010-security-threats-and-defenses.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security Threats and Defenses

Advanced Persistent Threats against RSA Tokens

 The information security management team requires authentic and on-time information for constantly monitoring new and potential threats and techniques.... The paper ''Advanced Persistent threats against RSA Tokens'' tells that Today, where every technology interrelated to Information technology involves the '.... Likewise, a new class of challengers called now 'Advanced Persistent threats (APT) demonstrates a well-planned and sponsored, highly skilled hackers targeting highly classified data for gaining competitive edge specifically incorporate businesses, law firms, military networks, national or international politics (Cole, 2012)....
5 Pages (1250 words) Essay

Advanced Persistent Threats Against RSA Tokens

Moreover, the net-centric ATM connectivity raises concerns for cyber security threats and vulnerabilities.... Information security management team requires authentic and on time information for constantly monitoring new and potential threats and techniques.... These mobilized resources were aligned to counter apparent cyber threats from terrorist attacks.... Propagation threats are critical because it is capable of rapidly broadcasting traffic on the Internet along with bypassing intrusion detection systems....
5 Pages (1250 words) Case Study

Security Recommendations After Security Breach

Since the network plan scope is limited by the form of threats it covers, often, IT related threats may have a separate IT plan is prepared using specialized knowledge.... With the network components to be defended, the next move is the determination of threats to be defended (Sighn, 2011, p.... However, the huge costs involved go not mean taking chances with business network security especially given the rapidly expanding networks both commercially and… With these and other factors, security issue gains top priority for all companies where information technology use is inevitable....
4 Pages (1000 words) Assignment

Proposing a Solution

is at a heightened level of cyber threats considering the milestones it has made in the telecommunications and technological fields.... At the helm of the escalating risks to the national security in the country, the cyber environment threats are equally evolving, as... Therefore, it is essential to establish workable approaches to maintaining the security of the communication and technological systems.... The advent of the security challenges created another aspect of terror, an establishment that many nations are yet to consider as a possible channel for terror attacks....
6 Pages (1500 words) Essay

Maintaining or Strengthening Amphibious Forces in the UK

Contribute forces to respond to a regional crisis or conflict that can affect European or NATO security or which can threaten British interest or those involving security concerns under the United NationsThe Amphibious Force, being an integral part of UK sea power and the UK armed forces, has the same responsibilities as the UK sea power and armed forces....
10 Pages (2500 words) Term Paper

The US Cyberspace - Emerging Threats

 The nations that oppose America have started targeting their systems by means of cyber threats and attacks.... The present discourse elaborates emerging threats for the US cyberspace.... Since cyber threats pose a high risk to a country's security, the country must incorporate efficient and effective tools to maintain its security.... They aim at attacking the security system by creating threats that result in problems like system crash and data loss....
5 Pages (1250 words) Research Paper

Smartphones and the Security of the Data in Them

hellip; With the information gathered regarding multiple security threats that are currently present and looming today, we can say that there is a significant issue regarding smartphones and the security of the data.... It is our natural response to build a defense for any threat that we encounter and develop these defenses according to developing threats.... This paper recognizes that there are lots of threats that can and will try to attack your device and aim for your information....
7 Pages (1750 words) Term Paper

Global Threats to the US National Security

This article will address the current nature of threats and the major priorities that the National Security Council should deal with them effectively.... This term paper "Global threats to the US National Security" presents threats to the National Security Council, that affect the world population at large.... The world has seen threats to security that are brought about because groups of people have prioritized personal interests....
2 Pages (500 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us