logo

Network and Security - Threats and Controls

14 Pages1843 Words104 Views
   

Added on  2023-06-03

About This Document

This article discusses the major controls for preventing, detecting, correcting or compensating threats in Network and Security. It covers antivirus, backup information, encryption algorithm, software policy, theft prevention, web monitoring tools, and more.

Network and Security - Threats and Controls

   Added on 2023-06-03

ShareRelated Documents
Running head: NETWORK AND SECURITY
Network and Security
Name of the Student
Name of the University
Author’s Note:
Network and Security - Threats and Controls_1
1
NETWORK AND SECURITY
Table of Contents
Threats and Controls..................................................................................................................2
Bibliography.............................................................................................................................12
Network and Security - Threats and Controls_2
2
NETWORK AND SECURITY
Threats and Controls
Threats could be easily categorized and controlled within the organization. The major
controls could be classified as administrative, product and physical and the controls can be
depicted as prevent, detect, correct or compensate.
The proper evaluation of the threat categories are as follows:
Threat
Category
Control Description Classifica
tion
Type
1.
Accidenta
l
corruptio
n of
informati
on
Antivirus The antivirus software is to be
implemented and to be kept
updated for the proper
prevention of such accidental
corruption of information. There
are several versions of this
software and the most updated
version should be implemented
for proper results.
Product Prevent
Complete
Backup of
Information
The confidential or sensitive
information should be taken
back up on a periodical manner.
This backup hence could prevent
the user from facing any
problem regarding the theft of
information by the hackers.
Administr
ative
Prevent
Using Encryption algorithm is Physical Prevent
Network and Security - Threats and Controls_3
3
NETWORK AND SECURITY
Encryption responsible for securing
confidential information by
encrypting the information
properly. This encryption is the
procedure of encoding any
message or information in such a
manner that only the authorized
and authenticated users could
access them and the hackers do
not get any access of it.
Regular
troubleshooting
of application
Troubleshooting should be done
to the respective application as
well as system issues for
protecting the confidential
information. Moreover, the
specific organization should take
these actions against these
issues.
Administr
ative
Correct
Using a surge
protector
The utilization of the surge
protector device is useful for
protecting the electrical devices
of information.
Product Prevent
2. Loss of
intellectu
al
Patents The patents are the grant
legalized right for excluding the
individuals from marketing the
Administr
ative
Prevent
Network and Security - Threats and Controls_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Networks and Cybersecurity: Threats and Controls
|13
|1739
|446

ENGR8762 Computer Networks and Cybersecurity
|8
|1020
|164

Network and Security: Threats and Controls
|10
|1781
|75

Threat Categories for Information Security: Prevention and Detection Techniques
|13
|1796
|257

Network and Security: Threat Control
|14
|1775
|486

Host and Application Security
|9
|1653
|308