Computer Networks and Cybersecurity: Threats and Controls
VerifiedAdded on 2023/06/03
|13
|1739
|446
AI Summary
This article discusses the various threats and controls in Computer Networks and Cybersecurity. It covers topics such as accidental corruption of information, loss of intellectual property, software piracy, theft of information, website defacement, theft of equipment, viruses, worms, Trojan horses, elevation of privilege, and fire/flood. The article provides detailed descriptions of each threat and suggests preventive measures to protect against them.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
COMPUTER NETWORKS AND CYBERSECURITY
Computer Networks and Cybersecurity
Name of the Student
Name of the University
Author Note
Computer Networks and Cybersecurity
Name of the Student
Name of the University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1COMPUTER NETWORKS AND CYBERSECURITY
Table of Contents
Threat: Accidental corruption of information............................................................................2
Threat: Loss of intellectual Property..........................................................................................2
Threat: Software Piracy..............................................................................................................3
Threat: Theft of information (Hacker).......................................................................................4
Threat: Theft of information (Employee)..................................................................................5
Threat: Website Defacement......................................................................................................6
Threat: Theft of equipment........................................................................................................6
Threat: Viruses, Worms, Trojan Horses....................................................................................7
Threat: Elevation of Privilege....................................................................................................8
Threat: Fire/ Flood.....................................................................................................................9
Reference..................................................................................................................................10
Table of Contents
Threat: Accidental corruption of information............................................................................2
Threat: Loss of intellectual Property..........................................................................................2
Threat: Software Piracy..............................................................................................................3
Threat: Theft of information (Hacker).......................................................................................4
Threat: Theft of information (Employee)..................................................................................5
Threat: Website Defacement......................................................................................................6
Threat: Theft of equipment........................................................................................................6
Threat: Viruses, Worms, Trojan Horses....................................................................................7
Threat: Elevation of Privilege....................................................................................................8
Threat: Fire/ Flood.....................................................................................................................9
Reference..................................................................................................................................10
2COMPUTER NETWORKS AND CYBERSECURITY
Threat: Accidental corruption of information
Threat Category Control Description Classification Type
Accidental
corruption of
information
Improper
Designed
systems
A well-built
designed system
having adequate
security
measure can
help in
preventing the
accidental
corruption of
information.
Administrative Prevent
Update security
policy
Current
versions of
software should
be installed as
they have their
default security
measures.
Administrative Prevent
Frequent use of
backup files
The backup
files should be
frequently
accessed so that
the purpose of
backup can be
achieved.
Physical Prevent
Regular
troubleshooting
application and
system
The most used
applications and
system should
be trouble-
shooted to
minimize the
issue of file
corruption
(Skaves 2015).
Physical Prevent
(Source: Created by the author)
Threat: Loss of intellectual Property
Threat Category Control Description Classification Type
Loss of
intellectual
Property
NDA Intellectual
property can be
protected with
Physical Prevent
Threat: Accidental corruption of information
Threat Category Control Description Classification Type
Accidental
corruption of
information
Improper
Designed
systems
A well-built
designed system
having adequate
security
measure can
help in
preventing the
accidental
corruption of
information.
Administrative Prevent
Update security
policy
Current
versions of
software should
be installed as
they have their
default security
measures.
Administrative Prevent
Frequent use of
backup files
The backup
files should be
frequently
accessed so that
the purpose of
backup can be
achieved.
Physical Prevent
Regular
troubleshooting
application and
system
The most used
applications and
system should
be trouble-
shooted to
minimize the
issue of file
corruption
(Skaves 2015).
Physical Prevent
(Source: Created by the author)
Threat: Loss of intellectual Property
Threat Category Control Description Classification Type
Loss of
intellectual
Property
NDA Intellectual
property can be
protected with
Physical Prevent
3COMPUTER NETWORKS AND CYBERSECURITY
the help of Non-
Disclosure
Agreement
Copy Right The intellectual
properties can
be saved from
being lost or
duplicated with
the help of the
copyright
protection
(Manzini and
Lazzarotti
2016). The life
of copyright
protection has
to be preset by
the concerned
organization or
individual.
Administration Compensate
Trademarks The prime
attributes of the
intellectual
properties can
be protected
with the use of
the trademarks.
The level of
quality of the
intellectual
properties can
also be retained
with the help of
trademarks.
Administration Prevent
Patents The intellectual
properties can
be saved with
the help of legal
rights known as
patents.
Administrative Prevent
(Source: Created by the author)
Threat: Software Piracy
Threat Control Description Classification Type
the help of Non-
Disclosure
Agreement
Copy Right The intellectual
properties can
be saved from
being lost or
duplicated with
the help of the
copyright
protection
(Manzini and
Lazzarotti
2016). The life
of copyright
protection has
to be preset by
the concerned
organization or
individual.
Administration Compensate
Trademarks The prime
attributes of the
intellectual
properties can
be protected
with the use of
the trademarks.
The level of
quality of the
intellectual
properties can
also be retained
with the help of
trademarks.
Administration Prevent
Patents The intellectual
properties can
be saved with
the help of legal
rights known as
patents.
Administrative Prevent
(Source: Created by the author)
Threat: Software Piracy
Threat Control Description Classification Type
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4COMPUTER NETWORKS AND CYBERSECURITY
Category
Software
Piracy
Software
Policy
Efficient software
policy should be
adopted by
individuals/organization
to deal with software
piracy
Administration Prevent
Anti-Piracy
Statements
The violations of the
anti-piracy statement
will lead to huge
penalty for the
individuals who will be
associated with the
software piracy
(Asongu, Singh and Le
Roux 2018).
Administration Prevent
Software
inventories
Keeping records about
each minute details of
the software including
the licensing
agreements.
Physical Prevent
Knowledge
about software
licenses
The expiry date,
updated versions and
the other important
details should be
frequently evaluated to
prevent the piracy of
the software.
Administrative Prevent
(Source: Created by the author)
Threat: Theft of information (Hacker)
Threat Category Control Description Classification Type
Theft of
information
(Hacker)
Firewall The theft of
information
from a system
can be avoided
by frequently
updating the
inbuilt anti-
virus systems.
Product Detect
Alphanumeric
password
Setting up
complex
passwords in
the networking
Administrative Prevent
Category
Software
Piracy
Software
Policy
Efficient software
policy should be
adopted by
individuals/organization
to deal with software
piracy
Administration Prevent
Anti-Piracy
Statements
The violations of the
anti-piracy statement
will lead to huge
penalty for the
individuals who will be
associated with the
software piracy
(Asongu, Singh and Le
Roux 2018).
Administration Prevent
Software
inventories
Keeping records about
each minute details of
the software including
the licensing
agreements.
Physical Prevent
Knowledge
about software
licenses
The expiry date,
updated versions and
the other important
details should be
frequently evaluated to
prevent the piracy of
the software.
Administrative Prevent
(Source: Created by the author)
Threat: Theft of information (Hacker)
Threat Category Control Description Classification Type
Theft of
information
(Hacker)
Firewall The theft of
information
from a system
can be avoided
by frequently
updating the
inbuilt anti-
virus systems.
Product Detect
Alphanumeric
password
Setting up
complex
passwords in
the networking
Administrative Prevent
5COMPUTER NETWORKS AND CYBERSECURITY
system can lead
to the check of
hacking issues.
Anti-Malware
software
The anti
malware
software helps
in the detection
of intrusions
within a system
(Smith, Rabiti,
and Szilard
2017).
Product Prevent
Limited user
account
The limited
number of users
in networking
system can lead
to the
prevention of
external threat
agents.
Administrative Prevent
(Source: Created by the author)
Threat: Theft of information (Employee)
Threat Category Control Description Classification Type
Theft of
information
(Employee)
Informal
auditing
Theft of
employee
information can
be stopped with
the help of
internal
auditing.
Administrative Correct
Tracking
business checks
The business
checks are
important for
tracking all the
ethical and
unethical
activities of the
organization.
Physical Correct
Security
systems
The security
systems can be
effectively used
for
identification of
Product Detect
system can lead
to the check of
hacking issues.
Anti-Malware
software
The anti
malware
software helps
in the detection
of intrusions
within a system
(Smith, Rabiti,
and Szilard
2017).
Product Prevent
Limited user
account
The limited
number of users
in networking
system can lead
to the
prevention of
external threat
agents.
Administrative Prevent
(Source: Created by the author)
Threat: Theft of information (Employee)
Threat Category Control Description Classification Type
Theft of
information
(Employee)
Informal
auditing
Theft of
employee
information can
be stopped with
the help of
internal
auditing.
Administrative Correct
Tracking
business checks
The business
checks are
important for
tracking all the
ethical and
unethical
activities of the
organization.
Physical Correct
Security
systems
The security
systems can be
effectively used
for
identification of
Product Detect
6COMPUTER NETWORKS AND CYBERSECURITY
the employees
who are
involved in theft
of information
(Nureni et al.
2016).
Employee
supervision
Supervision of
employees can
be used
efficiently for
the prevent of
information
theft.
Administrative Prevent
(Source: Created by the author)
Threat: Website Defacement
Threat Category Control Description Classification Type
Website
Defacement
Signature based
detection
technique
The sniffing and
logging
activities in a
website can be
checked with
the help of this
technique.
Physical Detect
Anomaly based
detection
technique
This technique
involves
monitoring of
the high
dynamic
content of the
websites with
the help of
sensors.
Physical Detect
Artificial
intelligence
Website
defacement can
be effectively
prevented with
the use of
intelligent
systems
(Steinbart et al.
2018).
Administrative Prevent
Checksum
calculation
The website
defacement can
Administrative Correct
the employees
who are
involved in theft
of information
(Nureni et al.
2016).
Employee
supervision
Supervision of
employees can
be used
efficiently for
the prevent of
information
theft.
Administrative Prevent
(Source: Created by the author)
Threat: Website Defacement
Threat Category Control Description Classification Type
Website
Defacement
Signature based
detection
technique
The sniffing and
logging
activities in a
website can be
checked with
the help of this
technique.
Physical Detect
Anomaly based
detection
technique
This technique
involves
monitoring of
the high
dynamic
content of the
websites with
the help of
sensors.
Physical Detect
Artificial
intelligence
Website
defacement can
be effectively
prevented with
the use of
intelligent
systems
(Steinbart et al.
2018).
Administrative Prevent
Checksum
calculation
The website
defacement can
Administrative Correct
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7COMPUTER NETWORKS AND CYBERSECURITY
be effectively
minimized with
the help of the
control
activation
algorithm.
(Source: Created by the author)
Threat: Theft of equipment
Threat Category Control Description Classification Type
Theft of
equipment
Camera
Surveillance
System
This instrument
can be
effectively used
for the detection
of the thieves
associated with
the theft of
equipment’s.
Product Detect
POS System Theft of
equipment can
be stopped with
the help of
tracking activity
of the POS
systems
(Kushwaha,
Buckchash and
Raman 2017).
Product Detect
Pre-
employment
check
The theft of
equipment’s can
be controlled
with the help of
pre-employment
check.
Administrative Prevent
Arrange shift
wisely
Management of
the employees
is simpler with
the help of
smaller teams.
Administrative Prevent
(Source: Created by the author)
be effectively
minimized with
the help of the
control
activation
algorithm.
(Source: Created by the author)
Threat: Theft of equipment
Threat Category Control Description Classification Type
Theft of
equipment
Camera
Surveillance
System
This instrument
can be
effectively used
for the detection
of the thieves
associated with
the theft of
equipment’s.
Product Detect
POS System Theft of
equipment can
be stopped with
the help of
tracking activity
of the POS
systems
(Kushwaha,
Buckchash and
Raman 2017).
Product Detect
Pre-
employment
check
The theft of
equipment’s can
be controlled
with the help of
pre-employment
check.
Administrative Prevent
Arrange shift
wisely
Management of
the employees
is simpler with
the help of
smaller teams.
Administrative Prevent
(Source: Created by the author)
8COMPUTER NETWORKS AND CYBERSECURITY
Threat: Viruses, Worms, Trojan Horses
Threat Category Control Description Classification Type
Viruses,
Worms, Trojan
Horses
Anti-spyware
tools
These tools are
important for
the detection of
malicious
activities from
virus, worms
and Trojan
Horses.
Product Prevent
Up-to-date
software
Updated
software’s have
inbuilt security
system
(Chandana,
Jilani, and
Javeed Hussain
2015).
Product Detect
Rogue security
software
Helps to prevent
against viruses
and worms.
Product Prevent
Enable Firewall Malicious
traffic are
blocked with
the help of the
firewall
Product Detect
(Source: Created by the author)
Threat: Elevation of Privilege
Threat Category Control Description Classification Type
Elevation of
Privilege
Microsoft
Video Control
Mishandling of
the objects in
memory can be
effectively
prevented with
the use of
Microsoft video
control (Edge
and O’Donnell
2016).
Product Prevent
SID filtering The risks Administration Prevent
Threat: Viruses, Worms, Trojan Horses
Threat Category Control Description Classification Type
Viruses,
Worms, Trojan
Horses
Anti-spyware
tools
These tools are
important for
the detection of
malicious
activities from
virus, worms
and Trojan
Horses.
Product Prevent
Up-to-date
software
Updated
software’s have
inbuilt security
system
(Chandana,
Jilani, and
Javeed Hussain
2015).
Product Detect
Rogue security
software
Helps to prevent
against viruses
and worms.
Product Prevent
Enable Firewall Malicious
traffic are
blocked with
the help of the
firewall
Product Detect
(Source: Created by the author)
Threat: Elevation of Privilege
Threat Category Control Description Classification Type
Elevation of
Privilege
Microsoft
Video Control
Mishandling of
the objects in
memory can be
effectively
prevented with
the use of
Microsoft video
control (Edge
and O’Donnell
2016).
Product Prevent
SID filtering The risks Administration Prevent
9COMPUTER NETWORKS AND CYBERSECURITY
associated with
elevation of
privilege can be
effectively
handled by the
help of listing
all the domains
in an enterprise.
PAM Privileged
Access
Management
can be effective
used to manage
the directory
services for the
escalations in
the privilege
accounts.
Product Detect
(Source: Created by the author)
Threat: Fire/ Flood
Threat Category Control Description Classification Type
Fire/ Flood Safety risk
assessment
Efficient risk
assessment
technique can
be used for
preventing
flood and fire.
Administrative Prevent
Hazard
Monitoring
System
The hazard
monitoring
system is used
for detecting
natural
calamities like
fire and flood
(Haber and
Hibbert 2018).
Product Detect
Smoke
Detectors
Smoke
detecting
systems can be
used as an alert
system from
flood and fire.
Product Detect
Good Professional Administrative Prevent
associated with
elevation of
privilege can be
effectively
handled by the
help of listing
all the domains
in an enterprise.
PAM Privileged
Access
Management
can be effective
used to manage
the directory
services for the
escalations in
the privilege
accounts.
Product Detect
(Source: Created by the author)
Threat: Fire/ Flood
Threat Category Control Description Classification Type
Fire/ Flood Safety risk
assessment
Efficient risk
assessment
technique can
be used for
preventing
flood and fire.
Administrative Prevent
Hazard
Monitoring
System
The hazard
monitoring
system is used
for detecting
natural
calamities like
fire and flood
(Haber and
Hibbert 2018).
Product Detect
Smoke
Detectors
Smoke
detecting
systems can be
used as an alert
system from
flood and fire.
Product Detect
Good Professional Administrative Prevent
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
10COMPUTER NETWORKS AND CYBERSECURITY
Housekeeping housekeeping
practices can be
very much used
as a preventive
measure from
fires.
Proper Waste
Disposal
Efficient
disposal is
important for
the prevention
of fire in an
area.
Administrative Prevent
Flood warning
systems
The flood
warning
systems are the
mostly used
technology for
the detection of
floods.
Product Detect
(Source: Created by the author)
Housekeeping housekeeping
practices can be
very much used
as a preventive
measure from
fires.
Proper Waste
Disposal
Efficient
disposal is
important for
the prevention
of fire in an
area.
Administrative Prevent
Flood warning
systems
The flood
warning
systems are the
mostly used
technology for
the detection of
floods.
Product Detect
(Source: Created by the author)
11COMPUTER NETWORKS AND CYBERSECURITY
Reference
Asongu, S.A., Singh, P. and Le Roux, S., 2018. Fighting software piracy: some global
conditional policy instruments. Journal of Business Ethics, 152(1), pp.175-189.
Chandana, R., Jilani, S. and Javeed Hussain, S., 2015. Smart surveillance system using thing
speak and Raspberry Pi. International Journal of Advanced Research in Computer and
Communication Engineering, 4(7), pp.214-218.
Edge, C. and O’Donnell, D., 2016. Malware Security: Combating Viruses, Worms, and Root
Kits. In Enterprise Mac Security (pp. 221-242). Apress, Berkeley, CA.
Haber, M.J. and Hibbert, B., 2018. Privileged Account Management Implementation. In
Privileged Attack Vectors (pp. 211-230). Apress, Berkeley, CA.
Kushwaha, P., Buckchash, H. and Raman, B., 2017, November. Anomaly based intrusion
detection using filter based feature selection on KDD-CUP 99. In Region 10 Conference,
TENCON 2017-2017 IEEE (pp. 839-844). IEEE.
Manzini, R. and Lazzarotti, V., 2016. Intellectual property protection mechanisms in
collaborative new product development. R&D Management, 46(S2), pp.579-595.
Nureni, Y.N., Edwin, A.E., Kikelomo, A.A. and Harrison, A.O., 2016. E‐Infrastructure and
E‐Services Security Platform Using Multifactor Cybercrime Deterrent System: A Conceptual
Model.
Skaves, P., 2015, April. FAA Aircraft Systems Information Security Protection Overview. In
Integrated Communication, Navigation, and Surveillance Conference (ICNS), 2015 (pp. A1-
1). IEEE.
Reference
Asongu, S.A., Singh, P. and Le Roux, S., 2018. Fighting software piracy: some global
conditional policy instruments. Journal of Business Ethics, 152(1), pp.175-189.
Chandana, R., Jilani, S. and Javeed Hussain, S., 2015. Smart surveillance system using thing
speak and Raspberry Pi. International Journal of Advanced Research in Computer and
Communication Engineering, 4(7), pp.214-218.
Edge, C. and O’Donnell, D., 2016. Malware Security: Combating Viruses, Worms, and Root
Kits. In Enterprise Mac Security (pp. 221-242). Apress, Berkeley, CA.
Haber, M.J. and Hibbert, B., 2018. Privileged Account Management Implementation. In
Privileged Attack Vectors (pp. 211-230). Apress, Berkeley, CA.
Kushwaha, P., Buckchash, H. and Raman, B., 2017, November. Anomaly based intrusion
detection using filter based feature selection on KDD-CUP 99. In Region 10 Conference,
TENCON 2017-2017 IEEE (pp. 839-844). IEEE.
Manzini, R. and Lazzarotti, V., 2016. Intellectual property protection mechanisms in
collaborative new product development. R&D Management, 46(S2), pp.579-595.
Nureni, Y.N., Edwin, A.E., Kikelomo, A.A. and Harrison, A.O., 2016. E‐Infrastructure and
E‐Services Security Platform Using Multifactor Cybercrime Deterrent System: A Conceptual
Model.
Skaves, P., 2015, April. FAA Aircraft Systems Information Security Protection Overview. In
Integrated Communication, Navigation, and Surveillance Conference (ICNS), 2015 (pp. A1-
1). IEEE.
12COMPUTER NETWORKS AND CYBERSECURITY
Smith, C., Rabiti, C. and Szilard, R., 2017. Risk-Informed Safety Margins Characterization
(RISMC) Pathway Technical Program Plan (No. INL/EXT-17-43243-Rev000). Idaho
National Lab.(INL), Idaho Falls, ID (United States).
Steinbart, P.J., Raschke, R.L., Gal, G. and Dilla, W.N., 2018. The influence of a good
relationship between the internal audit and information security functions on information
security outcomes. Accounting, Organizations and Society.
Smith, C., Rabiti, C. and Szilard, R., 2017. Risk-Informed Safety Margins Characterization
(RISMC) Pathway Technical Program Plan (No. INL/EXT-17-43243-Rev000). Idaho
National Lab.(INL), Idaho Falls, ID (United States).
Steinbart, P.J., Raschke, R.L., Gal, G. and Dilla, W.N., 2018. The influence of a good
relationship between the internal audit and information security functions on information
security outcomes. Accounting, Organizations and Society.
1 out of 13
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.