logo

Host and Application Security

9 Pages1653 Words308 Views
   

Added on  2023-06-04

About This Document

This article discusses access control, its impact on confidentiality, integrity and availability, and the necessary components of access control metric. It also covers contrasting access control for risks, threats and vulnerabilities, and the requirement of maintaining confidentiality, integrity and availability. The subject is Host and Application Security, and the course code, course name, and college/university are not mentioned.

Host and Application Security

   Added on 2023-06-04

ShareRelated Documents
Running head: HOST AND APPLICATION SECURITY
Host and Application Security
Name of the Student
Name of the University
Author’s Note:
Host and Application Security_1
1
HOST AND APPLICATION SECURITY
Table of Contents
Question 1..................................................................................................................................2
Question 2..................................................................................................................................3
Question 3..................................................................................................................................4
Question 4..................................................................................................................................5
Question 5..................................................................................................................................6
References..................................................................................................................................7
Host and Application Security_2
2
HOST AND APPLICATION SECURITY
Question 1
Contrasting Access Control for Risks, Threats and Vulnerabilities
i) The access control in respect to threats can be demonstrated for two types of threats,
which are internal threats and external threats. The internal threats occur from the individuals,
who have legalized access like employees or other personnel of a company. It is quite
difficult to prevent or detect them as they have legalized access to the systems (Yang et al.
2013). These insiders could easily misuse the IT resources of that organization for performing
the port scans outside the initiate attacks within that company. Moreover, they could access,
process as well as distribute the unauthorized information such as secret trade and salary. The
best measure for controlling the access of these threats is using passwords within the systems.
The outside intruders are hackers or attackers, who can misuse or attack the systems
or networks (Lee, Chung & Hwang, 2013). The hackers gain the confidential password by
usually running a password cracking application. Using encryption technique for the
messages is the easiest access control for this threat.
ii) Access control for risks like unauthorized disclosure of information, confidential
and sensitive information leading to the loss of credibility, is by involving encryption and
virtual private networks within the organization.
iii) Access control for vulnerabilities such as viruses is the implementation of
firewalls and antivirus software (Yang, Jia & Ren, 2013). The proper implementation of
firewall and antivirus software easily stops the vulnerability without much complexity.
Host and Application Security_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Home Network Vulnerabilities
|5
|858
|297

Cloud Computing: Information Security, BCP, Resource Management, SLA Management
|20
|4947
|200

Security Problems and Risk Management of CobWeb
|7
|1108
|410

Risk Management Assignment - Cloud Services
|6
|1018
|119

ENGR8762 Computer Networks and Cybersecurity
|8
|1020
|164

Creating a Company Culture for Security - Security steps and methods for an organization
|4
|534
|193