logo

Network and Security: Threats and Controls

10 Pages1781 Words75 Views
   

Added on  2023-06-03

About This Document

This article discusses the various threats to network and information security and the controls that can be implemented to prevent them. It covers accidental corruption, loss of intellectual property, software piracy, theft of equipment, website defacement, elevation of privilege, and fire/flood threats. The article provides a detailed description of each threat and the controls that can be used to prevent them. It also includes a bibliography of relevant research on the topic.

Network and Security: Threats and Controls

   Added on 2023-06-03

ShareRelated Documents
Running head: NETWORK AND SECURITY
NETWORK AND SECURITY
Name of the Student:
Name of the University:
Author Note:
Network and Security: Threats and Controls_1
1NETWORK AND SECURITY
Threat Category Control Description Classification Type
Accidental
Corruption of
information
Proper shut down
of the system
The proper shut
down of the
system will help
to save the files
containing the
information in a
proper way.
administration prevent
Installation of the
anti virus.
The
implementation
of the antivirus
will protect the
data from the
attacks from the
malware.
product prevent
Keeping the
backup of
information
regularly.
Keeping the
backup on regular
basis will give a
chance for the
users to retrieve
the right
information in
case the data is
corrupted.
Administrative prevent
Security against
the disturbance of
the power.
The disturbance
in the supply of
the power can
cause the loss of
the data in the
system. The spark
can damage the
files and
information in the
system.
product prevent
Threat Category Control Description Classification Type
Loss of
intellectual
property
Securing the
rights of the
intellectual
property.
Securing the
rights of the
intellectual
property is
important as it
will control the
usage of the
information.
administrative Detect , prevent
and compensate
Proper monitoring
of the usage of
the intellectual
The usage of the
information is
needed to be
administrative detect
Network and Security: Threats and Controls_2
2NETWORK AND SECURITY
property. monitored so that
the proper usage
of the information
is done in a
proper way.
Giving proper
reference while
using the
information.
The information
from the
intellectual
property is
needed to be
acknowledge
when it is used for
the references.
administrative Prevent and
compensate
Application of the
data protection
act.
The impose of the
rules in the data
protection act is
needed to be
done so that the
copyright of the
intellectual
property is
maintained.
administrative prevent
Threat Category Control Description Classification Type
Software Piracy Clear software
policy statement.
The clarity in the
software policy
will help the
employees to
understand the
boundaries in
using the
software
products.
administrative Prevent and
detect
Following anti
piracy statement.
The employees in
the organization
should maintain
the anti piracy
policies in the
organization.
Administrative detect
Knowing the
terms of licenses
The renewal of
the licenses are
needed to be
done maintain the
routine.
product detect
Software
inventories.
Software
inventories are
needed to be
product detect
Network and Security: Threats and Controls_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Threat Categories for Information Security: Prevention and Detection Techniques
|13
|1796
|257

Computer Networks and Cybersecurity: Threats and Controls
|13
|1739
|446

Network and Security: Threat Control
|14
|1775
|486

Network and Security - Threats and Controls
|14
|1843
|104

ENGR8762 Computer Networks and Cybersecurity
|8
|1020
|164

Network and Cybersecurity: Threats and Control Measures
|13
|1909
|314