Term Paper on "Top Cyber Security Risks"
Term Paper 4 pages (1242 words) Sources: 4
[EXCERPT] . . . .
Risk Management in Top Cyber Security RisksThe Top Cyber Security Risks
The process of identifying, assessing, and prioritizing of risks is referred to as risk management. After identifying risks, the next step is to use the available resources to reduce, look into and control the risk from taking place again. Cyber security risks can be categorized into two namely website vulnerabilities and client-side application flaws. In risk management the high impact risk as it has a high probability of occurring should be handled first, risks that have low impact and low probability of occurring should be handled last.
Client-side application flaws
The applications installed on a person's computer may have certain vulnerabilities that can be exploited by the attackers. The attackers usually target popular applications like Microsoft word, Adobe Reader, Flash player and Apple QuickTime. These applications have serious security flaws, and they need to be patched regularly to ensure the security flaws are rectified. There are other software applications that have security flaws, and the software manufacturers do not release any patches to rectify this flaws leaving their users vulnerable to attacks Hansen & Nissenbaum, 2009.
Many people fall victim to this application attacks because even the major companies take too long to release patches to fix the problems. The attackers usually send someone an email that requires them to open file attachments and that way the person's computer get attacked by the viruses. Other ways that attackers use is placing malicious documents on popular websites. The documents have embed
download full paper ⤓
To counter this risk computer users should ensure that their applications are well patched in case there has been a security flaw reported, or they should ensure they update their software applications on a regular basis. Users will need to ensure they do not click on links that they are not sure of, or downloading documents from emails and websites before they are scanned. Computers will need to have latest antivirus, antispyware, antimalware and intrusion detection programs installed to protect from any attack to the computer applications. It is also advisable to have programs that can detect, and remove any key logger applications that might be installed without the user's knowledge. Software applications makers should ensure that once security vulnerability has been discovered on their applications, they release a security patch that would update the application and fix the vulnerability. There are trends referred to as zero-day vulnerabilities. These vulnerabilities occur when there is a flaw in an application, and it is discovered before a security patch is availed. Attackers release a code that exploits this vulnerability until a fix is released or users find ways to mitigate against this flaw.
For organizational computers, it is recommended that the organization conducts its own assessment on application vulnerability. This assessment will assist the organization to counter any threats and attacks that they might face. Together with this assessment organizations should have antivirus software, strong firewalls, antimalware, intrusion prevention systems and antispyware programs installed on all their organizations computers Anandarajan, 2002.
These programs will prevent any attack from occurring.
Website vulnerabilities
Website vulnerabilities are SQL injection, cross-site scripting and PHP remote file attacks. These attacks are mostly targeted to websites that are not secured properly and the codes used are not secure. Website developers should ensure that their websites are not susceptible to attacks, which would compromise the website content Doerr & Hecht, 1995.
Website attackers do not just target sensitive data like credit card information or passwords. They also target any information that might be stored in the websites database. Once a website data has been compromised visitors to the website may not get the correct information as the accuracy of the data… READ MORE
Quoted Instructions for "Top Cyber Security Risks" Assignment:
Based on the document, The Top Cyber Security Risks, write four-page paper on the application of risk management with these types of security risks.
Thank you.
The Top Cyber Security Risks http://www.sans.org/top-cyber-security-risks
- Executive Summary
- Vulnerability Exploitation Trends
- Origin and Destination Analysis for 4 Key Attacks
- Application vs. Operating System Patching
- Tutorial: HTTP Client-Side Exploitation Example
- Zero-Day Vulnerability Trends
- Best Practices in Mitigation and Control
- HTTP Server Threats
How to Reference "Top Cyber Security Risks" Term Paper in a Bibliography
“Top Cyber Security Risks.” A1-TermPaper.com, 2012, https://www.a1-termpaper.com/topics/essay/risk-management-top-cyber/8807. Accessed 6 Jul 2024.
Related Term Papers:
Cyber Security Most Important Cyber Security Vulnerability Research Paper
Cyber Security
Most Important Cyber Security Vulnerability
One of the most important and common cyber security vulnerability is the maintenance of hardware as well as software. Weak maintenance, which is… read more
Research Paper 8 pages (2328 words) Sources: 8 Topic: Computers / IT / Internet
Risk Minimization and Loss Prevention in Small Term Paper
Risk Minimization and Loss Prevention in Small Business in the Post-9/11 ERA
Chapter 1, Introduction,
Chapter 2, Literature Review,
Chapter 3, Methodology,
Chapter 4, Data Analysis,
Chapter 5, Summary, Recommendations… read more
Term Paper 59 pages (16256 words) Sources: 1+ Topic: Business / Corporations / E-commerce
Technology Issue in Information Assurance Term Paper
Technology Issue in Information Assurance
Cyberwars: The Virtual Battlefield of the 21st Century
In the very near future, many conflicts will not take place on the open field of battle,… read more
Term Paper 10 pages (3012 words) Sources: 15 Topic: Military / Army / Navy / Marines
Analyzing the Cyber Security Phenomenon Essay
Dean, who equally has some accounting background, made more than 10-K records for Sony SNE 2.83%, Target TGT 0.84% and Home Depot HD 1.49%, after their new well-advertised security breaches.… read more
Essay 6 pages (2266 words) Sources: 6 Topic: Philosophy / Logic / Reason
Business Continuity Plan Term Paper
In order to develop and implement a good data backup strategy/policy, time management as well as time increments must be considered. This is because data could get backed up on… read more
Term Paper 8 pages (2322 words) Sources: 10 Topic: Business / Corporations / E-commerce
Sat, Jul 6, 2024
If you don't see the paper you need, we will write it for you!
We can write a new, 100% unique paper!