logo

Information System Security and Risk Management

   

Added on  2023-06-05

15 Pages3898 Words364 Views
Running head: INFORMATION SYSTEM SECURITY AND RISK MANAGEMENT
Information System Security and Risk Management
Name of the Student
Name of the University
Author Note
Information System Security and Risk Management_1
1INFORMATION SYSTEM SECURITY AND RISK MANAGEMENT
Table of Contents
1. Introduction:...............................................................................................................2
2. Ransomware Malware:...............................................................................................3
2.1 Working Mechanism:...........................................................................................3
2.2 Tools to tackle ransomware attack:......................................................................3
3. Network routers and switches threats:.......................................................................4
5. Ensuring confidentiality and integrity of staff email:................................................5
6. Threats, malware and security issues of the webmail and web server:......................5
7. Improving the availability of the email server:..........................................................6
8. Human factors impact and organizational issues:......................................................8
9. Use of Log records:....................................................................................................9
10. Usage of audit log records:...................................................................................10
11. 5 tools used for protecting the framework:............................................................10
Conclusion:..................................................................................................................11
References:...................................................................................................................12
Information System Security and Risk Management_2
2INFORMATION SYSTEM SECURITY AND RISK MANAGEMENT
1. Introduction:
The ransomware is a typical malicious software which is used by the hackers to get
the access to the victim's computer or similar type of devices. The ransomware actually
blocks the users from accessing their own computer system (Kharraz et al., 2015). To release
the important data stored in the system the hacker wants a ransom or a payment from the
victim. This is not also sure that the attacker will give the data access to the victim after the
payment. This malicious software generally comes in the form of an email from an unknown
source which actually pretends to be a trusted source. The main aim of this report is to
discuss various types of ransomware attacks and how the working mechanism of the
ransomware attack. With the mechanism, this report will also discuss three tools to tackle the
ransomware attack in the Amazon aws services. With the ransomware attack, the devices of
the network are highly vulnerable in the Amazon web services. This report will also discuss
how these devices are vulnerable to attacks.
Further, this report will also discuss how the Amazon web services can ensure the
availability and reliability of the web services. With that, the email confidentiality and
integrity of the organization will also be evaluated. The security issues and malware related
problems of the webmail server will be discussed. To improve the availability of the web
server, two approaches will be discussed. Evaluating these parts risk management
recommendation will be discussed to reduce the risks of the employees in the Amazon web
services organization. The log reports also have a big role in the security aspects. How this
logs can be used for analysing the web server problems will be evaluated. Also, the
importance of the audit log report will be discussed. Lastly, five types of network security
devices will be discussed how these devices can help to reduce the risks and threats.
Information System Security and Risk Management_3
3INFORMATION SYSTEM SECURITY AND RISK MANAGEMENT
2. Ransomware Malware:
The ransomware is a typical harmful software which is capable of locking the files
without the administrative permissions, and this files only can be accessed by a key for which
the attacker wants a payment form the victim.
2.1 Working Mechanism:
When the user or the owner of the computer downloads the ransomware file as an
email attachment and opens the file, the malicious codes start to execute. This execution
process encrypts the important personal files stored in the local storage (Maurya et al., 2018).
2.2 Tools to tackle ransomware attack:
The three best tools to tackle the ransomware attack are the:
Kaspersky anti-ransomware tool: This tool runs in the background of the operating
system and observes the activity of the network traffic. Whenever anything found
suspicious or behaving like the ransomware it blocked immediately (McNeil, Frey &
Embrechts, 2015).
McAfee Ransomware Interceptor: The McAfee ransomware inspector can detect
various types of ransomware attacks including the latest WannaCry malware. Though
the McAfee ransomware inspector can raise false detections in some cases it still one
of the best tools to tackle the ransomware attack.
Avast anti-ransomware tools: It is not necessary that all the ransomware will work
in the same way. For certain cases decryption is needed and the process of decryption
can be different for different types of ransomware.
Information System Security and Risk Management_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IS Security & Risk Management: Threats, Mitigation Techniques and Improvements
|21
|4379
|226

IS security and Risk Management
|16
|4607
|284

IT Security and Risk Management: Threats, Malware, and Solutions
|17
|4012
|187

Security of Information System and Risk Management in MetaSoft System
|17
|3475
|84

Information System Security: Threats and Solutions for Google Company
|19
|4845
|128

Network Security and Types of Security Threats and Attacks in Information Technology
|8
|2577
|274