logo

Contingency Operations Assignment

   

Added on  2020-05-04

9 Pages1570 Words33 Views
 | 
 | 
 | 
Operation contingencies 1
OPERATION CONTINGENCIES
Course:
Tutor:
University:
University location
Date:
Contingency Operations Assignment_1

OPERATION CONTINGENCIES 2
Assessment One.
Introduction
Organizations currently are rapidly immersing themselves into the modern technology to
maximize operation. This has brought on board increased internet threats that are even more
devastating than just deploying manual operations. The trend has shifted to securing the
organization data more meanly than service delivery. Organizations have put in place resources
to curb impending risks and unnecessary attacks into the systems. As a result innovations in the
networking field have been able to come up with concepts like SDN and NFV. This technology
has enhanced security and minimized cost. Threats range from natural disasters to man-made
disasters.
Eavesdropping
Computer attacks have been the major security challenges facing organizations in the recent
times. Eavesdropping computer attack is an unauthorized interception of secret communications
such as phone calls and messages transmission in real time (Thurner 2017). This is achieved
through development of encryption software that is capable of intercepting messages before
getting into the destination; they decrypt the data and direct it to a different destination. It is also
referred to as wiretapping.
Penetration
Penetration is a computer attack technique that that involves malicious entry into private systems
with the aim of getting vital information about the organization (Chen 2016). Penetration is
achieved after a thorough reconnaissance of the target system to detect faults.
Contingency Operations Assignment_2

OPERATION CONTINGENCIES 3
Viruses
Viruses are known to offer protection from suspicious software. When a machine is actively
protected by a legit antivirus, it is not easy for an attacker to gain entry into your computer.
Viruses have the ability to prevent, detect and stop installation of suspicious software or opening
of malicious websites.
Denial of service attack
Denial of service attack is mostly evident in the banking system. Hardly do banks come out to
reveal that they have been attacked. Denying an attack is not a good practice.
Human error
Human error in the computer attack industry is mostly forgetting to log out from the system after
a day’s work. Forgetting to log out, grants an attacker an easier access into the system. Another
error is opening of counterfeit links. The links may be software that can automatically get
installed unknowingly.
Bomb threat
Bombs may destroy the networking system or damage the computers completely. Bombs can
smash servers hence exposing data to potential attackers
Storms or earthquake
As discussed in the journal (Lam 2017). Natural disasters such as floods, storms and
earthquakes are some the rare but fatal threats to data loss. They cannot be prevented and hardly
are they detected. Storms can lead to permanent loss of data.
Contingency Operations Assignment_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment | Cyber Security
|23
|2174
|14

IT Audit Report for Telecommunication Industry
|13
|2808
|107

Business Continuity Plan (BCP)
|5
|1012
|61