Nobody downloaded yet

Identify risks/threats and countermeasures in given scenarios - Essay Example

Comments (0) Cite this document
Cloud data storage is the new trend of data handling. Data stored on the cloud can be retrieved at anytime and anywhere. Cloud storage is a networked online storage, where storage of data is in virtualized storage pools. Cloud service…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.5% of users find it useful
Identify risks/threats and countermeasures in given scenarios
Read TextPreview

Extract of sample "Identify risks/threats and countermeasures in given scenarios"

Download file to see previous pages It is only the administrator and may be his assistant who has the password to the organization’s data. Considerations are made on the availability, confidentiality and integrity of the data. Regular change of passwords is required so as to ensure maximum security of the data. The change of passwords eliminates the likelihood of anybody cracking them. Encryption of the passwords serves to add to the security of the data (Mahmood 2014, p.105).
Cloud storage promises high data availability and reduced infrastructure but, on the other hand, it poses a problem of security of the stored data. This has made the adoption of cloud data storage quite slow among users.
ABC Company has developed a data security system that uses password encryption. A single password protects an encrypted file, which stores a bunch of user passwords. This kind of password management involves quite a number of vulnerabilities and risks. For instance, the single password is only five alphabetic characters. In computer security, such a password is very weak and vulnerable to easy cracking by unauthorized persons who can gain access to all the other passwords. A strong and secure password should comprise of alphabetic, numbers, and special characters, bringing to zero any chances of unauthorized access. A password should contain at least 10 bit entropy (Fischer-Hübner, Duquenoy, Hansen, Leenes, & Zhang 2011, p.135).
Moreover, there is a need for a frequent change of passwords. The administrator of the ABC Company is currently changing the password once a month. This is not secure enough. Waiting for the whole month to change the password can create a room for other persons to guess the passwords and access the system.
Delegation of change of passwords to a colleague by the administrator is another risk posed to the security of ABC Company’s data. The colleague cannot always be trusted. The colleague can leak the password to other colleagues, leaving the system at stake. The ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Identify risks/threats and countermeasures in given scenarios Essay”, n.d.)
Identify risks/threats and countermeasures in given scenarios Essay. Retrieved from
(Identify risks/Threats and Countermeasures in Given Scenarios Essay)
Identify risks/Threats and Countermeasures in Given Scenarios Essay.
“Identify risks/Threats and Countermeasures in Given Scenarios Essay”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Identify risks/threats and countermeasures in given scenarios


...? Management Scenarios Given the driving forces of the market, and the focal questions that the organisation is dealing with; there are certain possibilities that the management needs to be aware of. It is important that decisions be taken in advance so that the predicted conditions of the market are prepared for. Managers need to get themselves and their staff trained, and reinforce their technological and man powers so that they are ready to meet the requirements of the future. In the meanwhile, the foundation ideals and principles on which the organisation is based need to be strengthened so that it can withstand the winds of change. Given the conditions that we have been focusing on,...
7 Pages(1750 words)Essay

IT Security Threats and Countermeasures

...effective security measures. 3.3.2 Countermeasures Edwards defined honeypots as a method to identify the botnet controller in the network. A system is kept isolated in the network that possesses certain degree of data and serves as an attraction for the botnet controller. Upon the actions of the botnet controller to acquire power of the system (in other words, make it a zombie), the network administrators pursue their investigation regarding the origin of the commands and the identity of the host that remotely controls the system. 3.4 Insider Attacks Alongside the presence of external security threats to IT security, there exists equally important source of attacks that often go...
8 Pages(2000 words)Research Paper


.... Learners will need to get what the teacher is trying to put across through writing, listening, recording and so on. The teacher should prepare a study guide, which has the main points that she is trying to put across. For this to be more effective, guideline questions can be. This can guide note taking. She should say explicitly where the students should focus on. The third strategy is not to overload the system. Learners should be given breaks in between to comprehend the information. During these break students can be asked to ask questions and give a summary of what the lecture was about. This will enable the teacher to know if the lecture was effective. Whenever the break is over, the attention of the learners will...
3 Pages(750 words)Essay

Legal Scenarios

..., 2013, p.17).In this scenario, Glenn has a limited power to delegate given that he must seek prior consent from the management of Big time. The manager was not obliged to accept every request, and could, therefore, dictate when Glenn could delegate. The third indicium rests to the fact that Glenn used his own truck and tools to do the work. Where an employee provides his own tools of trade, the relationship is more likely to be one for services (Abdalla, Abraham v Viewdaze Pty Ltd). Nevertheless, not every instance that an employee provides their own tools that the balance tilts in favor of independent contractors. In Hollis v Vabu Pty Ltd (2001) 207 CLR 21 the court considered that bicycles that the...
3 Pages(750 words)Case Study

Ethical Scenarios

...Ethical Scenarios Donna and Michael Michael will have a moral sense of duty to something. He obviously does not have a sense of duty to the team. Donna should appeal to the sense of duty that Michael may have. This may be himself, the school, his parents, or his grades. Even if he is only duty bound by a sense of self-interest, Donna should point out to him that his self-interest and the team's interest are not different. If Michael is being lazy and ignoring his sense of doing what is right by believing that the team will carry him, he needs to be shown that the harm to the team will not be in his self-interest. Stephanie Stephanie should not lie for her teammate. Stephanie has an obligation to her own sense of right...
2 Pages(500 words)Essay

Laboratory Scenarios

...Laboratory scenarios Safety precautions in the laboratory are an essence that has to be adhered to by anyone who is concerned with chemicals and other reagents especially in the chemistry laboratory. The chemicals and other reactants found in these laboratories pose a great danger to the personnel and other users of the laboratories if the necessary care is not taken, and safety measures adhered to. These risks may range from inhaling poisonous and irritating gases, burns from chemicals that are highly reactive and other far reaching implication that can be caused by the reagents and other chemicals in the laboratories. According to the National Institute for Occupational safety and Health (2006), anyone...
5 Pages(1250 words)Essay

GBN Scenarios

...of national resources 1. The health sector 2. The industrial sector 3. The domestic and international security sectors Potential Entrants 1. Online education programs 2. Use of audio books instead of text-based electronic books 3. International school systems Present Substitutes 1. Printed books 2. Handwritten notebooks 3. Typed notes given to students by teachers. Scenario Framework Step 4: Conditions that will shape the adoption of information technology by the education sector within the next 10 years. 1. Young people will always need to be educated. 2. The government will always have a central role to play in the education of its citizens. 3. There will always be a need for change in policy and...
6 Pages(1500 words)Essay

Business Scenarios

...Task: Business Scenario 3 The problem in scenario 3 is lack of commitment in accomplishing group tasks. One exhibitsminimal interest in compiling a business report by failing to attend the group discussion. Apart from failing to join other students in accomplishing the assignment, the student has developed a habit of arriving late for lessons and leaving early. This implies that the student lacks motivation to engage in schoolwork. As a result, he exhibits minimal commitment to assignments. Moreover, it is apparent that the student does not value education, and it seems that his parents force him to go to school. Moreover, it appears that he is in school just to pass time. One strategy to assist in...
1 Pages(250 words)Essay

Employee Scenarios

...harassment, and substance abuse as fictional scenarios, which employer deals with regarding employees. All these scenarios have effects to the employee and the employer. The employee finds it difficult to cope with such situations in the company. It makes it impossible for the employer, to delegate duties to such workers, because of poor performance. On the other hand, employees find it difficult to cope with work demands, when the scenarios’ affect them. It is important for employers to form and develop regulations within their work place that tend to regulate occurrence of such scenarios within the work place. Internet Abuse Technology enables majority of employees to...
2 Pages(500 words)Essay

Criminal Scenarios

...Criminal Scenario: Part Clark’s Liability Clark’s liability for the criminal homicide of Andrew and Blake can be determined from the fact that he did not intend to kill the two although his action led to their death. Mens rea is the legal term that is used to describe criminal intent or attitude in the commission of a crime (Samaha 124). Mens rea refers to the intention of the person behind committing the crime. A person can only be held to be liable for committing a crime if there is an explicitly stated or inferred criminal intent to commit the crime. Mens rea is an essential element of homicide and has to be present for liability to be determined. In the present case, Clark’s intention was to hunt deer and he...
7 Pages(1750 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Identify risks/threats and countermeasures in given scenarios for FREE!

Contact Us