Term Paper on "Top Cyber Security Risks"

Term Paper 4 pages (1242 words) Sources: 4

[EXCERPT] . . . .

Risk Management in Top Cyber Security Risks

The Top Cyber Security Risks

The process of identifying, assessing, and prioritizing of risks is referred to as risk management. After identifying risks, the next step is to use the available resources to reduce, look into and control the risk from taking place again. Cyber security risks can be categorized into two namely website vulnerabilities and client-side application flaws. In risk management the high impact risk as it has a high probability of occurring should be handled first, risks that have low impact and low probability of occurring should be handled last.

Client-side application flaws

The applications installed on a person's computer may have certain vulnerabilities that can be exploited by the attackers. The attackers usually target popular applications like Microsoft word, Adobe Reader, Flash player and Apple QuickTime. These applications have serious security flaws, and they need to be patched regularly to ensure the security flaws are rectified. There are other software applications that have security flaws, and the software manufacturers do not release any patches to rectify this flaws leaving their users vulnerable to attacks Hansen & Nissenbaum, 2009.

Many people fall victim to this application attacks because even the major companies take too long to release patches to fix the problems. The attackers usually send someone an email that requires them to open file attachments and that way the person's computer get attacked by the viruses. Other ways that attackers use is placing malicious documents on popular websites. The documents have embed
Continue scrolling to

download full paper
ded code targeted for vulnerable applications.

To counter this risk computer users should ensure that their applications are well patched in case there has been a security flaw reported, or they should ensure they update their software applications on a regular basis. Users will need to ensure they do not click on links that they are not sure of, or downloading documents from emails and websites before they are scanned. Computers will need to have latest antivirus, antispyware, antimalware and intrusion detection programs installed to protect from any attack to the computer applications. It is also advisable to have programs that can detect, and remove any key logger applications that might be installed without the user's knowledge. Software applications makers should ensure that once security vulnerability has been discovered on their applications, they release a security patch that would update the application and fix the vulnerability. There are trends referred to as zero-day vulnerabilities. These vulnerabilities occur when there is a flaw in an application, and it is discovered before a security patch is availed. Attackers release a code that exploits this vulnerability until a fix is released or users find ways to mitigate against this flaw.

For organizational computers, it is recommended that the organization conducts its own assessment on application vulnerability. This assessment will assist the organization to counter any threats and attacks that they might face. Together with this assessment organizations should have antivirus software, strong firewalls, antimalware, intrusion prevention systems and antispyware programs installed on all their organizations computers Anandarajan, 2002.

These programs will prevent any attack from occurring.

Website vulnerabilities

Website vulnerabilities are SQL injection, cross-site scripting and PHP remote file attacks. These attacks are mostly targeted to websites that are not secured properly and the codes used are not secure. Website developers should ensure that their websites are not susceptible to attacks, which would compromise the website content Doerr & Hecht, 1995.

Website attackers do not just target sensitive data like credit card information or passwords. They also target any information that might be stored in the websites database. Once a website data has been compromised visitors to the website may not get the correct information as the accuracy of the data… READ MORE

Quoted Instructions for "Top Cyber Security Risks" Assignment:

Based on the document, The Top Cyber Security Risks, write four-page paper on the application of risk management with these types of security risks.

Thank you.

The Top Cyber Security Risks http://www.sans.org/top-cyber-security-risks

- Executive Summary

- Vulnerability Exploitation Trends

- Origin and Destination Analysis for 4 Key Attacks

- Application vs. Operating System Patching

- Tutorial: HTTP Client-Side Exploitation Example

- Zero-Day Vulnerability Trends

- Best Practices in Mitigation and Control

- HTTP Server Threats

How to Reference "Top Cyber Security Risks" Term Paper in a Bibliography

Top Cyber Security Risks.” A1-TermPaper.com, 2012, https://www.a1-termpaper.com/topics/essay/risk-management-top-cyber/8807. Accessed 6 Jul 2024.

Top Cyber Security Risks (2012). Retrieved from https://www.a1-termpaper.com/topics/essay/risk-management-top-cyber/8807
A1-TermPaper.com. (2012). Top Cyber Security Risks. [online] Available at: https://www.a1-termpaper.com/topics/essay/risk-management-top-cyber/8807 [Accessed 6 Jul, 2024].
”Top Cyber Security Risks” 2012. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/risk-management-top-cyber/8807.
”Top Cyber Security Risks” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/risk-management-top-cyber/8807.
[1] ”Top Cyber Security Risks”, A1-TermPaper.com, 2012. [Online]. Available: https://www.a1-termpaper.com/topics/essay/risk-management-top-cyber/8807. [Accessed: 6-Jul-2024].
1. Top Cyber Security Risks [Internet]. A1-TermPaper.com. 2012 [cited 6 July 2024]. Available from: https://www.a1-termpaper.com/topics/essay/risk-management-top-cyber/8807
1. Top Cyber Security Risks. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/risk-management-top-cyber/8807. Published 2012. Accessed July 6, 2024.

Related Term Papers:

Cyber Security Most Important Cyber Security Vulnerability Research Paper

Paper Icon

Cyber Security

Most Important Cyber Security Vulnerability

One of the most important and common cyber security vulnerability is the maintenance of hardware as well as software. Weak maintenance, which is… read more

Research Paper 8 pages (2328 words) Sources: 8 Topic: Computers / IT / Internet


Risk Minimization and Loss Prevention in Small Term Paper

Paper Icon

Risk Minimization and Loss Prevention in Small Business in the Post-9/11 ERA

Chapter 1, Introduction,

Chapter 2, Literature Review,

Chapter 3, Methodology,

Chapter 4, Data Analysis,

Chapter 5, Summary, Recommendations… read more

Term Paper 59 pages (16256 words) Sources: 1+ Topic: Business / Corporations / E-commerce


Technology Issue in Information Assurance Term Paper

Paper Icon

Technology Issue in Information Assurance

Cyberwars: The Virtual Battlefield of the 21st Century

In the very near future, many conflicts will not take place on the open field of battle,… read more

Term Paper 10 pages (3012 words) Sources: 15 Topic: Military / Army / Navy / Marines


Analyzing the Cyber Security Phenomenon Essay

Paper Icon

Dean, who equally has some accounting background, made more than 10-K records for Sony SNE 2.83%, Target TGT 0.84% and Home Depot HD 1.49%, after their new well-advertised security breaches.… read more

Essay 6 pages (2266 words) Sources: 6 Topic: Philosophy / Logic / Reason


Business Continuity Plan Term Paper

Paper Icon

In order to develop and implement a good data backup strategy/policy, time management as well as time increments must be considered. This is because data could get backed up on… read more

Term Paper 8 pages (2322 words) Sources: 10 Topic: Business / Corporations / E-commerce


Sat, Jul 6, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!