logo

Malware and Threads Detection, Security and Risk Management (Atlassian)

14 Pages2580 Words335 Views
   

Added on  2021-06-18

About This Document

IS SECURITY AND RISK MANAGEMENT 7 IS SECURITY AND RISK MANAGEMENT IS Security and Risk Management (Atlassian) Name of the student: Name of the university: Author Note Executive summary Atlassian is one of the most popular enterprise software organization located in Australia. Next, it analyzes multiple networking devices, reliability and availability of different web-services. The aim of the report is to identify common malware and various threads against Atlassian’s information system, identification of different networking devices, availability and

Malware and Threads Detection, Security and Risk Management (Atlassian)

   Added on 2021-06-18

ShareRelated Documents
Running head: IS SECURITY AND RISK MANAGEMENT IS Security and Risk Management(Atlassian)Name of the student:Name of the university:Author Note
Malware and Threads Detection, Security and Risk Management (Atlassian)_1
1IS SECURITY AND RISK MANAGEMENTExecutive summaryAtlassian is one of the most popular enterprise software organization located in Australia. Here thereport aims to recognize various common malware and threads against information of the company.Next, it analyzes multiple networking devices, reliability and availability of different web-services.Apart from this, it assesses methods ensuring confidentiality and integrity of various employeeemails. Lastly, different malware and security problems concerning webmails and web servers areanalyzed here.
Malware and Threads Detection, Security and Risk Management (Atlassian)_2
2IS SECURITY AND RISK MANAGEMENTTable of Contents1. Introduction:......................................................................................................................................32. Common malware and threads against Information systems of Atlassian:.......................................33. Required networking devices for Atlassian:......................................................................................44. Assuring availability and reliability of web services:........................................................................45. Methods to assure integrity and confidentiality of staff emails:........................................................55.1. Confidentiality:...............................................................................................................55.2. Integrity:.........................................................................................................................56. Prioritization and discussion of threats and possible kinds of security and malware related to a web server and web-mails:....................................................................................................................67. Two approaches to developing availability of email and web servers:.............................................68. Effect of organizational issues and human factors on risk management and IS-related securities:. .88.1. The organizational issues:...............................................................................................88.2. Human factors:................................................................................................................99. Various illustrations of security and problems at managing risks at Atlassian:................................910. Audit log reports:.............................................................................................................................911. Proposal of network security devices:...........................................................................................1012. Conclusion:....................................................................................................................................1113. Recommendations:........................................................................................................................1114. References:....................................................................................................................................12
Malware and Threads Detection, Security and Risk Management (Atlassian)_3
3IS SECURITY AND RISK MANAGEMENT1. Introduction: Atlassian Corporation Plc is an enterprise software company situated in Australia. It createsproducts for content management, project managers and software developers. Thus it has beenproviding information systems to its customers and staffs ("Atlassian | Software Development andCollaboration Tools", 2018). The aim of the report is to identify common malware and various threads against Atlassian’sinformation system, identification of different networking devices, availability and reliability of webservices. It also analyzes methods assuring integrity and confidentiality of staff emails andprioritization of threats and kinds of security and malware issues related to web servers andwebmails. 2. Common malware and threads against Information systems of Atlassian:Adware This malware delivers advertisements automatically. Bot This threat is a software program for performing particular operations automatically. Spyware This functions through spying on user activities instead of any knowledge. Worm This threat is spread around computer networks through exploiting vulnerabilities of operating systems. Trojan Horse This disguises as a regular program or file for tricking users to install and download software. It provides remote access to infected computers (DeAngelo & Stulz, 2015). 3. Required networking devices for Atlassian:The first one is Network Interface Card (NIC), which is very much important for networking.This is helpful for computers for creating communications with others. The next one is a hub whichis used for connecting various computers under a single workgroup LAN network (McNeil, Frey &Embrechts, 2015). The next one is a bridge which is used for improving performances where thenetworks are divided into smaller segments. It is used for dividing huge networks into smaller
Malware and Threads Detection, Security and Risk Management (Atlassian)_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT Security and Risk Management: Threats, Malware, and Solutions
|17
|4012
|187

Information System Security and Risk Management
|15
|3898
|364

IS Security & Risk Management: Threats, Mitigation Techniques and Improvements
|21
|4379
|226

Security of Information System and Risk Management in MetaSoft System
|17
|3475
|84

IS Security and Risk Management: Doc
|16
|3835
|67

IS Security and Risk Management : Assignment
|16
|3847
|48