logo

Computer Networks and Cybersecurity: Threats and Controls

Describe and classify the type of controls that should be put in place in an organization for various threat categories in computer networks and cybersecurity.

13 Pages1739 Words446 Views
   

Added on  2023-06-03

About This Document

This article discusses the various threats and controls in Computer Networks and Cybersecurity. It covers topics such as accidental corruption of information, loss of intellectual property, software piracy, theft of information, website defacement, theft of equipment, viruses, worms, Trojan horses, elevation of privilege, and fire/flood. The article provides detailed descriptions of each threat and suggests preventive measures to protect against them.

Computer Networks and Cybersecurity: Threats and Controls

Describe and classify the type of controls that should be put in place in an organization for various threat categories in computer networks and cybersecurity.

   Added on 2023-06-03

ShareRelated Documents
COMPUTER NETWORKS AND CYBERSECURITY
Computer Networks and Cybersecurity
Name of the Student
Name of the University
Author Note
Computer Networks and Cybersecurity: Threats and Controls_1
1COMPUTER NETWORKS AND CYBERSECURITY
Table of Contents
Threat: Accidental corruption of information............................................................................2
Threat: Loss of intellectual Property..........................................................................................2
Threat: Software Piracy..............................................................................................................3
Threat: Theft of information (Hacker).......................................................................................4
Threat: Theft of information (Employee)..................................................................................5
Threat: Website Defacement......................................................................................................6
Threat: Theft of equipment........................................................................................................6
Threat: Viruses, Worms, Trojan Horses....................................................................................7
Threat: Elevation of Privilege....................................................................................................8
Threat: Fire/ Flood.....................................................................................................................9
Reference..................................................................................................................................10
Computer Networks and Cybersecurity: Threats and Controls_2
2COMPUTER NETWORKS AND CYBERSECURITY
Threat: Accidental corruption of information
Threat Category Control Description Classification Type
Accidental
corruption of
information
Improper
Designed
systems
A well-built
designed system
having adequate
security
measure can
help in
preventing the
accidental
corruption of
information.
Administrative Prevent
Update security
policy
Current
versions of
software should
be installed as
they have their
default security
measures.
Administrative Prevent
Frequent use of
backup files
The backup
files should be
frequently
accessed so that
the purpose of
backup can be
achieved.
Physical Prevent
Regular
troubleshooting
application and
system
The most used
applications and
system should
be trouble-
shooted to
minimize the
issue of file
corruption
(Skaves 2015).
Physical Prevent
(Source: Created by the author)
Threat: Loss of intellectual Property
Threat Category Control Description Classification Type
Loss of
intellectual
Property
NDA Intellectual
property can be
protected with
Physical Prevent
Computer Networks and Cybersecurity: Threats and Controls_3
3COMPUTER NETWORKS AND CYBERSECURITY
the help of Non-
Disclosure
Agreement
Copy Right The intellectual
properties can
be saved from
being lost or
duplicated with
the help of the
copyright
protection
(Manzini and
Lazzarotti
2016). The life
of copyright
protection has
to be preset by
the concerned
organization or
individual.
Administration Compensate
Trademarks The prime
attributes of the
intellectual
properties can
be protected
with the use of
the trademarks.
The level of
quality of the
intellectual
properties can
also be retained
with the help of
trademarks.
Administration Prevent
Patents The intellectual
properties can
be saved with
the help of legal
rights known as
patents.
Administrative Prevent
(Source: Created by the author)
Threat: Software Piracy
Threat Control Description Classification Type
Computer Networks and Cybersecurity: Threats and Controls_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network and Security - Threats and Controls
|14
|1843
|104

Threat Categories for Information Security: Prevention and Detection Techniques
|13
|1796
|257

Network and Security: Threats and Controls
|10
|1781
|75

Network and Security: Threat Control
|14
|1775
|486

Network and Cybersecurity: Threats and Control Measures
|13
|1909
|314

ENGR8762 Computer Networks and Cybersecurity
|8
|1020
|164