logo

Network and Security: Threat Control

14 Pages1775 Words486 Views
   

Added on  2023-06-03

About This Document

This article discusses the importance of identifying threats and setting accurate controls to eliminate the risks of business loss. It provides recommendations for control to certain threat categories such as accidental, loss of intellectual property, viruses, worms, Trojan horses, fire/flood, and more. The article also emphasizes the significance of regular data backup, appropriate disaster recovery system, and prompt action in case of fire or flood.

Network and Security: Threat Control

   Added on 2023-06-03

ShareRelated Documents
Running head: NETWORK AND SECURITY
Network and Security
Name of the Student
Name of the University
Author Note
Network and Security: Threat Control_1
1
NETWORK AND SECURITY
Threat Control
It is essential to identify the threats and set accurate controls for the identified threats. This eliminates the risks of business
loss. The recommendations for control to certain threat categories are represented in the following table-
Threat Category Control Description Classification Type
Accidental
corruption of
information
Regular Backup Regular backup will eliminate the
chances of data loss even if the
information stored is accidentally
corrupted
Administrative Compensate
Protection against Power
disturbances
One of the significant reasons of data
corruption is power disturbances. If
that can be fixed, the probability of
data corruption can be reduced.
Administrative Prevent
Ensuring proper shutting down
of the system after use
Data can be corrupted with improper
handling of information system and
therefore, it needs to be prevented
Administrative Prevent
Use of Proper antivirus and
spyware protection
Another significant reason behind
data corruption might be because of
Product Detect
Network and Security: Threat Control_2
2
NETWORK AND SECURITY
malware infection which can be
eliminated by making use of proper
antivirus and spyware protection.
Loss of
intellectual
property
Ensuring confidentiality by
enforcing access control
Access control can possibly ensure
confidentiality of intellectual
property thereby preventing the loss
of the same.
Administrative Detect
Maintaining good records of
data
This is important for prevention of
loss of intellectual property.
Administrative Compensate
The contacts and grant of rights
for the property access should
be checked.
The grant of rights should be wise in
order to prevent the loss of
intellectual property.
Administrative Prevent
Incoming trade secretes should
be restricted
Certain incoming trade secrets can
be risky for the intellectual property
and thus should be restricted.
Administrative Prevent
Regular Intellectual property
Audits
Regular audits will be able to
identify the risks associated with the
Administrative Prevent
Network and Security: Threat Control_3
3
NETWORK AND SECURITY
intellectual property.
Software piracy Development of software
policy statement
Having a clear software piracy
statement will help in explaining
how employees can legally acquire a
software thus preventing its piracy.
Product Prevent
Make employees accept and
sign an anti piracy statement
This will prevent the processing of
the information without permission.
Administrative Prevent
Ensuring regular software
inventories
If the staffs of an organization make
sure that the product name, version
number and the serial number for
each piece of software installed on
every computer is documented, the
issue can be prevented. Furthermore,
it is necessary for an organization to
perform unannounced audits.
Administrative Detect
An accurate knowledge of It is essential to keep all the licenses Administrative Prevent
Network and Security: Threat Control_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network and Security: Threats and Controls
|10
|1781
|75

Computer Networks and Cybersecurity: Threats and Controls
|13
|1739
|446

Network and Security - Threats and Controls
|14
|1843
|104

Threat Categories for Information Security: Prevention and Detection Techniques
|13
|1796
|257

ENGR8762 Computer Networks and Cybersecurity
|8
|1020
|164

Culture and Information Systems Security
|6
|1131
|491