logo

Assignment on Risks and Risk Management

Create an engaging presentation and guidebook on identifying and assessing IT security risks and organizational policies to protect business critical data and equipment.

11 Pages781 Words13 Views
   

Added on  2022-08-26

Assignment on Risks and Risk Management

Create an engaging presentation and guidebook on identifying and assessing IT security risks and organizational policies to protect business critical data and equipment.

   Added on 2022-08-26

ShareRelated Documents
RISKS AND RISK
MANAGEMENT
Name of the Student
Name of the University
Assignment on Risks and Risk Management_1
INTRODUCTION
The security system are integrated with the computer networks for
monitoring and preventing the unauthorized access, modification and
misuse of information. The security of a network can be improved by
analyzing the firewall configuration and reconfiguring it to restrict the
unauthorized user to access the network. DMZ zone can be implemented
along with the use of static IP and NAT such that different types of attacks
such as DDOS can be restricted and the performance of the network is
not affected.
Assignment on Risks and Risk Management_2
TYPES OF SECURITY RISK TO AN
ORGANIZATION
Computer virus
Rogue security software
Trojan horse
Adware and spyware
Computer worm
DOS and DDOS attack
Phishing
Rootkit
SQL Injection attack
Man-in-the-middle attacks
Assignment on Risks and Risk Management_3
SECURITY RISK DESCRIPTION
Computer virus – It is designed for spreading between the hosts and are sent as
email attachment or downloaded from malicious websites. It have the intention to
infect the system by utilizing systems on the network.
Rogue security software – It is malicious software used for misleading user and
believing that virus is installed or system is vulnerable. The user is offered to update
security settings that can lead to installation of malware in the computer.
Trojan horse – It can record the password by hacking webcam or recording
keystrokes and steal sensitive data residing in the computer.
Adware and spyware – It can consist of key logger intended for recording personal
information such as mail address, password, credit card and theft the identity.
Computer worm – It is malware program that replicate and spread quickly with the
computers and the contacts. It is used for exploitation of software vulnerability.
Assignment on Risks and Risk Management_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
ICTNWK509 Design and Implement a Security Perimeter for ICT Networks
|11
|2802
|16

Network Security: Tools and Techniques for Protection
|4
|900
|214

Identified Vulnerabilities and Preventive Measures for Social and Operational Threats
|2
|642
|189

Malware Analysis Assignment PDF
|29
|6377
|378

Networking: Malicious Attacks, Social Engineering, Information Security Risks, Network Auditing, and Risk Assessment Management
|10
|3587
|73

Malware Virus: Types, Analysis, and Prevention
|14
|3926
|1