StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Identify risks/threats and countermeasures in given scenarios - Essay Example

Cite this document
Summary
Cloud data storage is the new trend of data handling. Data stored on the cloud can be retrieved at anytime and anywhere. Cloud storage is a networked online storage, where storage of data is in virtualized storage pools. Cloud service…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.9% of users find it useful
Identify risks/threats and countermeasures in given scenarios
Read Text Preview

Extract of sample "Identify risks/threats and countermeasures in given scenarios"

Download file to see previous pages

It is only the administrator and may be his assistant who has the password to the organization’s data. Considerations are made on the availability, confidentiality and integrity of the data. Regular change of passwords is required so as to ensure maximum security of the data. The change of passwords eliminates the likelihood of anybody cracking them. Encryption of the passwords serves to add to the security of the data (Mahmood 2014, p.105). Cloud storage promises high data availability and reduced infrastructure but, on the other hand, it poses a problem of security of the stored data.

This has made the adoption of cloud data storage quite slow among users. ABC Company has developed a data security system that uses password encryption. A single password protects an encrypted file, which stores a bunch of user passwords. This kind of password management involves quite a number of vulnerabilities and risks. For instance, the single password is only five alphabetic characters. In computer security, such a password is very weak and vulnerable to easy cracking by unauthorized persons who can gain access to all the other passwords.

A strong and secure password should comprise of alphabetic, numbers, and special characters, bringing to zero any chances of unauthorized access. A password should contain at least 10 bit entropy (Fischer-Hübner, Duquenoy, Hansen, Leenes, & Zhang 2011, p.135). Moreover, there is a need for a frequent change of passwords. The administrator of the ABC Company is currently changing the password once a month. This is not secure enough. Waiting for the whole month to change the password can create a room for other persons to guess the passwords and access the system.

Delegation of change of passwords to a colleague by the administrator is another risk posed to the security of ABC Company’s data. The colleague cannot always be trusted. The colleague can leak the password to other colleagues, leaving the system at stake. The

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Identify risks/threats and countermeasures in given scenarios Essay”, n.d.)
Identify risks/threats and countermeasures in given scenarios Essay. Retrieved from https://studentshare.org/information-technology/1673649-identify-risksthreats-and-countermeasures-in-given-scenarios
(Identify risks/Threats and Countermeasures in Given Scenarios Essay)
Identify risks/Threats and Countermeasures in Given Scenarios Essay. https://studentshare.org/information-technology/1673649-identify-risksthreats-and-countermeasures-in-given-scenarios.
“Identify risks/Threats and Countermeasures in Given Scenarios Essay”, n.d. https://studentshare.org/information-technology/1673649-identify-risksthreats-and-countermeasures-in-given-scenarios.
  • Cited: 0 times

CHECK THESE SAMPLES OF Identify risks/threats and countermeasures in given scenarios

The Purpose of Safety and Security for Preparedness and Prevention

This security model for preparedness and prevention has been designed to respond to terrorist threats.... The need for the preparedness and prevention is thus important because threats can considerably cause devastation of infrastructures.... The need for the preparedness and prevention model is due to the fact that people need to have awareness and training regarding how to counter terrorist threats.... Categorization is the most helpful way to identify assets as noted in other preparedness and prevention plans (Bureau of Justice Assistance, 2005)....
9 Pages (2250 words) Essay

How Does Spyware Work

In fact, everyday a large number of threats and issues are emerging to make information security a more complicated task.... The basic purpose of this research is to present an overview of spyware, its types, it's working, and some of the countermeasures.... Though there are many tools and techniques that can be used to deal with these emerging security threats, some security threats are so sophisticated that the majority of tools and techniques fail to effectively deal with them....
11 Pages (2750 words) Research Paper

IT Infrastructure Business Recovery Planning for Critical Information System

hellip; Here we discussed the countermeasures of data loss, presenting data, the transformation of data to the outcome, and the reasons for the data loss and security measures.... "IT Infrastructure Business Recovery Planning for Critical Information System" research undertook the critical review of literature and primary research since the ethos of understanding the theory via actual experience is a sure way in understanding the queries of the research....
27 Pages (6750 words) Coursework

Network Infrastructure for Segments within the Enterprise

For instance, if an asset requires a security control that costs more than the asset value, the rules are discarded, and alternate cost-justified countermeasures are implemented to ensure all identified vulnerabilities are addressed and taken care of.... This paper ''Network Infrastructure for Segments within the Enterprise'' tells that Our organization's network proposal assures significant cost savings by deploying the appropriate technology extracted by a reliable risk assessment and cost-benefit analysis for the network....
5 Pages (1250 words) Term Paper

The Major Security Threats

In fact, these security threats and attacks are becoming more and more complicated over time.... I have chosen six security threats and applied penetration testing on them to strengthen their security.... The paper 'The Major Security threats' presents computer and network security that has turned out to be a serious challenge for governments, organizations, and individuals.... This report presents a detailed analysis of some of the major security threats by applying penetration testing techniques in order to determine the risks that these security threats pose to users....
8 Pages (2000 words) Term Paper

Methods for Risk Assessment

hellip; Notably, in the present day scenario, threats to information and data of business have been quite wide.... This case study "Methods for Risk Assessment" focuses on performing a four-step risk assessment for a particular scenario on the basis of a four-step process with the help of a chosen OCTAVE method....
11 Pages (2750 words) Case Study

Midterm System of Security

Try to provide good answers, examples, + commentary for at least 5 of these questions, and as many extra answers as you want to handle: A machine, on the other hand, is a device used to shape a given material, and normally it does not work on its own, it requires a tool.... The paper "Midterm System of Security" presents the difference between tools, machines, and systems....
10 Pages (2500 words) Essay

Information Classification Scheme 3D Media Comm. Ltd

To achieve countermeasures to be placed, the company must formulate a set of terms and relationships between them, (Nesteruk, 2014).... The aim of this article is to identify the minimum standards 3D Media Comm.... The aim of this article is to identify the minimum standards 3D Media Comm.... These conditions will undoubtedly help communicate and begin to classify data types; this creates an opportunity to identify the risk by the type of data in question....
12 Pages (3000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us