logo

Security and Risk Management

   

Added on  2023-01-12

13 Pages3408 Words76 Views
Security and Risk
Management

Table of Contents
Introduction......................................................................................................................................3
Task 1...............................................................................................................................................3
Illustrate two types of threats in mobile devices along with their vulnerability to destruction
and abuse......................................................................................................................................3
Security protection techniques that can be utilized within mitigation of risks for mobile devices
......................................................................................................................................................5
Illustrate how firm can make sure availability of web service by using Apache.........................6
Impact on employees of information security along with risk management...............................7
Specify auditing tools for Linux server and way in which they will be utilized by MBC..........9
Task 2.............................................................................................................................................10
Creation of two directories.........................................................................................................10
Demonstrate different ways for creating three users.................................................................11
Conclusion.....................................................................................................................................12
References......................................................................................................................................13

Introduction
Security and risk assessment refers to identification, assessment as well as execution of key
security controls within the application. It aids firm within emphasizing on prevention of apps
from security defects along with vulnerability. Basically, it furnishes firm with a enhanced way
through which they can acknowledge nature of security threats as well as interaction with them
(Amin, Valverde and Talla, 2020). To understand concept about and security and risk assessment
MBC is taken into account which is a TV broadcasting firm who permit their employees to
utilize own computing devices within the working premises. This report comprises of different
threats, protection techniques and their mitigation. Furthermore, it also furnishes ways to ensure
availability servers and impact on information security of employees along with different
auditing tools.
Task 1
Illustrate two types of threats in mobile devices along with their vulnerability to destruction and
abuse
Like spyware and viruses which impact systems like PC or laptop, there is wide range of
security threats which creates an impact on mobile devices. A security threat refers to risks
which can probably harm computer system and organization. This can be either due to physical
or non-physical aspects. Physical involves stealing the mobile devices which comprises of vital
information (Arora and Gigras, 2020). Like within MBC firm employees are allowed with their
own devices then it is obvious that those have some important information related with
organization. The non-physical aspects comprise of virus attacks like malware, ransomware, etc
which can create harm to information present within the system or even steal that. Basically,
non-physical attacks provide user with unauthorized access into the system of users or
organization. The mobile security threats which can be experienced by employees of MBC while
delivering their operations have been specified below:
Application based threats: When employees or any user download application they
comprises of different types of security issues which can be installed within mobile devices.
Any application do not illustrate whether they are malicious or not and are formulated with
an intent to carry out a fraud (Brashear, 2020). Even sometimes legitimate software is being

exploited for carrying out fraudulent activities. With respect to MBC, there can experience
certain application based threats and might fit into any of the category specified beneath:
Malware: This implies software that is liable for carrying out malicious activities
when installed within mobile devices. User will not know about the changes which
will be made by malware within mobile like it can make charges to phone bills, send
messages to contact list or furnish control to third person who made this attack (What
is a mobile threat?, 2020).
Spyware: It is liable for collecting or making use of private data of users without
their knowledge and approval for them for any activity that is being carried out. Data
that is being attacked by this is text messages, browser history, contact list, user
location, private photos and many other aspects.
Privacy threats: It is not necessary that they are malicious but will make use of
sensitive data like contact list, photos, etc.
Vulnerable applications: They are the apps which comprises of flaws that can be
exploited for conducting malicious activities. Vulnerabilities aid attacker to have
access to sensitive information. Web based threats: As mobile devices are being connected to internet and are being used
frequently for accessing web based services. Employees of MBC can face various issues
for their mobile devices, they are as:
Phishing scams: Text messages, Twitter, email and Facebook is being utilized for
sending links to websites which are formulated for trick individuals into render
information such as account numbers, etc. It is difficult to identify whether they
are from legitimate user or not.
Drive by downloads: This will automatically download application when web
page is visited and here users may or may not be prompted to take further actions
(Chopra and Chaudhary, 2020).
Browser exploits: They takes advantage from vulnerabilities which are present
within web browser of mobile like PDF reader, or flash player.
In above discussion two threats have been illustrated and probable impact they can create
on users. For an instance, by visiting an unsafe webpage, users by themselves trigger browser

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security and Risk Assessment for Mobile Devices
|11
|2676
|85

Ways to Secure Mobile Devices and Linux Web Servers
|9
|2857
|100

Cybersecurity and Linux Web Server
|8
|1965
|82

Security and Risk Management in MBC Organization
|7
|2046
|37

Types of Threats Against Mobile Devices and Security Protection Techniques
|8
|2120
|79

Computer Security: Fundamentals, Examples, and Countermeasures
|15
|5240
|98