logo

IT Security and Risk Management: Threats, Malware, and Solutions

   

Added on  2023-06-04

17 Pages4012 Words187 Views
Running head: IT SECURITY AND RISK MANAGEMENT
IT SECURITY AND RISK MANAGEMENT
Name of the Student
Name of the University
Author Note
IT Security and Risk Management: Threats, Malware, and Solutions_1
2IT SECURITY AND RISK MANAGEMENT
Table of Contents
1. Introduction..................................................................................................................................4
2. Ransomware malwares threads against organization Information systems................................4
a. working mechanism of ransomware........................................................................................4
b. Three tools to tackle the ransomware attack............................................................................5
3. Threats against network routers and switches.............................................................................5
How routers and switches are vulnerable to destruction and abuse............................................5
4. Discussion on how the organization can ensure the reliability and availability of the web........7
service..............................................................................................................................................7
5. The ways to ensure confidentiality and integrity of the staff email............................................7
6. Discussion and prioritize the threats and the possible types of malware and security................8
issues related to web mail and webserver........................................................................................8
7. Proposal of two approaches to improve the availability of email servers.................................10
8. Impact of human factors and organizational issues on IS-related security and risk..................11
management...................................................................................................................................11
Risk management recommendations.........................................................................................11
9. Use of logs.................................................................................................................................11
10. Details analysis of activity log.................................................................................................12
11. Five network security devices.................................................................................................12
IT Security and Risk Management: Threats, Malware, and Solutions_2
3IT SECURITY AND RISK MANAGEMENT
12. Conclusion...............................................................................................................................13
13. References................................................................................................................................14
IT Security and Risk Management: Threats, Malware, and Solutions_3
4IT SECURITY AND RISK MANAGEMENT
1. Introduction
The main objective to the report is to take into consideration different aspect which are
related to the security of the different devices which are connected to the internet. There can be
different types of intruder attack which can be included into the working of the organization. In
most of these situation it can be stated that if there are any type of intruder activity it can directly
decrease the quality which is related to the data which is stored in the server (Bichou, 2015). The
aspect of the reliability of the data can be directly be linked with the aspect of the integrity of the
data.
The organization which is selected in the sector is the Atlassian which is an information
technology organization which focus on the aspect of providing better security implication to the
different standard which is related to the concept.
2. Ransomware malwares threads against organization Information systems
a. Working mechanism of ransomware
The concept of ransomware can be considered as a malicious software that directly takes
control of the overall system and directly threatens the system. It can be stated as one of the most
common types of attack which is generated in the system or in the network. Ones there is an
attack relating to ransomware the data of the computer can be at stack. One of the common
working mechanism which is related to the working of the ransomware is the phishing spam. The
attack is mainly generated in the sector of an email which is generated from the attackers which
aim at the controlling of the system. Ones the email is accessed and then downloaded the system
would be consisting of the ransomware or the virus. The concept can also trick the user to take
control of the system and also generate an administrative access of the system.
IT Security and Risk Management: Threats, Malware, and Solutions_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IS security and Risk Management
|16
|4607
|284

IS Security & Risk Management: Threats, Mitigation Techniques and Improvements
|21
|4379
|226

Information System Security and Risk Management
|15
|3898
|364

IS Security and Risk Management: Telstra Corporation Ltd
|17
|3798
|88

Security of Information System and Risk Management in MetaSoft System
|17
|3475
|84

Information System Security: Threats and Solutions for Google Company
|19
|4845
|128