Question

Prepare a detailed written report discussing the potential security threats and vulnerabilities of a fictitious organization,...

Prepare a detailed written report discussing the potential security threats and vulnerabilities of a fictitious organization, Adventure Scuba and Diving Institute (ASDI). Please see the Specification section for more details on assignment submission requirements. Scenario: Adventure Scuba and Diving Institute (ASDI) is located in the United States and offers training and certification programs for scuba and deep sea diving. ASDI is a premier training school in the area of diving and scuba and has developed a wealth of proprietary training resources, videos, guides and manuals. The school suspects that competitors have tried to breach the organization’s computer systems to gain access to these training materials. ASDI’s network is comprised of two web servers, two file servers, one email server, 50 employee workstations, and a 50-workstation student computer lab. The school also has public and private Wi-Fi availability throughout the campus. Your firm has been hired as the IT security analyst to review, evaluate, and make recommendations with respect to maintenance of security of the organization’s computer and network systems. You have been charged by your supervisor to prepare a preliminary report documenting the most critical security threats that ASDI faces.

Below are three links that can help with the research and analysis:

1. https://www.helpnetsecurity.com/2010/11/15/top-10-security-threats-for-2011/

2. http://cve.mitre.org/find/index.html

3. https://www.flexerasoftware.com/enterprise/

Your supervisor has asked you to consider and account for the following questions as you shortlist the threats and prepare your report:

What threats are new this year and which have become more prevalent?

Why are these threats more common and why are they important?

What threats remain constant from year to year? Why?

What threats do you believe will become more critical in the next twelve months? Why?

Has an exploit been released?

What is the likelihood of an exploit?

How widely used is the software or system?

Homework Answers

Answer #1

What threats are new this year and which have become more prevalent?

- this year, we expect to see a growing awareness to security incidents of an “insider job” nature. Attention will grow as a consequence of an increased flow of incident reports where data theft and security breaches are tied to employees and other insiders.

Also, Man in the browser attack sophistication is going to increase, as well as moving forward to more types of online applications. the Man in the browser attack is one of the most dangerous types of attacks a cyber criminal can use. This method employs the usage of a Trojan Horse or similar malware to gain important information from users of websites, especially banking and credit card information. It is a piece a code that alters and adds different input fields to a webpage you are visiting. Since the URL is not changed, you believe that the site needs that information, you simply fill it in.

Then , we expect social platforms to invest more resources in improving the security posture of the platform. These measures will provide improved protection against application layer attacks, stronger authentication and account control features, as well as better malware detection systems.

We expect to see a growing number of data breaches where compromised data is in the form of files rather than database records. Consequently, organizations will rush to look for the proper tools to control access to repositories of unstructured data, mainly file servers. We estimate that the number of compromised files, and the number of organizations that suffer a massive file related security breach, will rise.

Why are these threats more common and why are they important?

In today’s social networking platform, both security and trust are in danger. Cross-site scripting (XSS) and cross-site request forgery (CSRF) vulnerabilities are quickly translating into massive worm out brakes.

Our enterprise most common secuirty threat will be from the breach of the company's database.

memory dump attack

A memory dump attack is the capture and use of RAM content that was written to a storage drive during an unrecoverable error, which was typically triggered by the attacker. Since, the design of the enterprise consists of so many intermediate networks, it is likely that a hacker can temporarily shut down systems and gain access to valuable cacche memory.

then we'll need to address the risks presents in workstations.

First,we must protect company information on the workstation from theft and disclosure by someone who gains physical access to the computer through theft or loss.

Second, we need to prevent the workstation from becoming infected with malware, which can wreak havoc on the workstation as well as your network and expose confidential information.

Thirdlly, we need to protect the workstation from the end user, who might disable security settings or install unauthorized software, both of which could expose the computer to the problems I previously mentioned, as well as expose the company to legal liability associated with software license violations.

then, we need to protect against network attacks where an intruder on the network actively breaks into the workstation through an open port or insecure application.

also , we will encounter email related threats like

Spam and Viruses- they are slowly becoming one and the same. they can slow our servers or completely shut them off, like a "zombie".

"dictionary attacks," this technique steals proprietary information from corporate directories. During a DHA, spammers attempt to deliver messages to multiple addresses, such as [email protected], [email protected], and [email protected]. Addresses that are not rejected by the receiving mail server are determined to be valid. A successful DHA can net a spammer thousands of corporate email addresses in just a few minutes.

What threats remain constant from year to year? Why?

basic IT sector which remain common from year to year shall be

Viruses - most companies receive lots of infected emails or files. Worms or trojans are the most maligned.

Then , after effects of virus attacks are also dangerous. The vulnerability here is the back doors viruses leave in their wake, or the chinks in the corporate armour that later generations of code can exploit. Students in campus connected to the same wifi networks or even remotely based hackers can access our important files!

Hacking in general, will remain a constant threat. with us being deployed in and around campus, leads to us being more open to potential hacks!

What is the likelihood of an exploit?

An exploit happens when that flaw, or software/hardware vulnerability, is exploited and attackers release malware before a developer has an opportunity to create a patch to fix the vulnerability.

No, as per the information provided here, exploit has not yet been released!

The likelihood of an exploit in this case is moderate ranging to being probable. Given the conjusted and the people in co-ordance with the students and the campus while there is a greater chance of mischief.

How widely used is the software or system?

The system is in use regulaly, whilst it can see a rise in usage if the schools decides to held diving competitions or activities! As it is ,we can expect continuous usage of out platform by students who are in to the sport and can continue to believe that the usage numbers would only go up given the nature of the sport continuously catching the eye of school generations!

--------------

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
FinTechCo Case Study Company Overview FinTechCo is a medium-sized financial services company comprising of 45 employees...
FinTechCo Case Study Company Overview FinTechCo is a medium-sized financial services company comprising of 45 employees with an annual revenue of $10 million. It has approximately 1000 customers comprising of private individuals and small companies. FinTechCo’s mission is to provide financial services and advice to its clients, to sell various products and services and offer consultation guidance regarding the information systems that support them. Problem Statement FinTechCo’s technical team were originally qualified financial planners who transitioned into technical roles and...
QUESTION 1 Advanced Security Inc. was hired by the Treasury Bank Inc. for securing their systems....
QUESTION 1 Advanced Security Inc. was hired by the Treasury Bank Inc. for securing their systems. The first thing they did was implement the best practice if separation of domains. As a result of this The bank had to get a new domain name. any change made in the records points to only one party who could have made that change. If you are a technical person, you must have office in a particular area of the building. accessing outside...
In narrative essay format, I want you to address a business/organization case study using multiple concepts...
In narrative essay format, I want you to address a business/organization case study using multiple concepts from class. The case question and case text begin on page 5 of this document. You need to demonstrate their best understanding of management and organizational behavior theory, and the application of those ideas to improve the understanding of various issues. You need to clearly identify at least 3 distinct, substantive issues. For each issue you need to 1), identify evidence from the case...
Review the Robatelli's Pizzeria Case Study. Develop another internal controls system, but this time, in the...
Review the Robatelli's Pizzeria Case Study. Develop another internal controls system, but this time, in the purchases and fixed assets business areas. Prepare a 12- to 16-slide presentation describing the purchases and fixed assets business areas. Be sure to incorporate speaker notes as well as appropriate visuals, graphics, fonts, etc. Include any associated risk in these areas. Describe specific internal controls that include authorization of transactions, segregation of duties, adequate records and documentation, security of assets, and independent checks and...
provide 3-4 paragraphs post (team 2) 1-What are 4 key things you learned about the topic...
provide 3-4 paragraphs post (team 2) 1-What are 4 key things you learned about the topic from reading their paper? 2-How does the topic relate to you and your current or past job? 3-Critique the paper in terms of the organization and quality.1- Employee Stress and how it has an Adverse Effect on a Company This paper explores employee stress and how it has an adverse effect on a company, its employees and the organization. Job stress can have a...
Assignment: What are the main arguments in the article? Please answer within 5 hours. It is...
Assignment: What are the main arguments in the article? Please answer within 5 hours. It is extremely urgent!!!!!!!!!!!!!!!!!!!!!!!! --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- BIOETHICS. Bioethics as a field is relatively new, emerging only in the late 1960s, though many of the questions it addresses are as old as medicine itself. When Hippocrates wrote his now famous dictum Primum non nocere (First, do no harm), he was grappling with one of the core issues still facing human medicine, namely, the role and duty of the...
What topics are covered in the following article? Please answer within 5 hours. It is extremely...
What topics are covered in the following article? Please answer within 5 hours. It is extremely urgent!!!!!!!!!!!!!!!!!!!!!!!! --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- BIOETHICS. Bioethics as a field is relatively new, emerging only in the late 1960s, though many of the questions it addresses are as old as medicine itself. When Hippocrates wrote his now famous dictum Primum non nocere (First, do no harm), he was grappling with one of the core issues still facing human medicine, namely, the role and duty of the physician....
Delta airlines case study Global strategy. Describe the current global strategy and provide evidence about how...
Delta airlines case study Global strategy. Describe the current global strategy and provide evidence about how the firms resources incompetencies support the given pressures regarding costs and local responsiveness. Describe entry modes have they usually used, and whether they are appropriate for the given strategy. Any key issues in their global strategy? casestudy: Atlanta, June 17, 2014. Sea of Delta employees and their families swarmed between food trucks, amusement park booths, and entertainment venues that were scattered throughout what would...
Using the model proposed by Lafley and Charan, analyze how Apigee was able to drive innovation....
Using the model proposed by Lafley and Charan, analyze how Apigee was able to drive innovation. case:    W17400 APIGEE: PEOPLE MANAGEMENT PRACTICES AND THE CHALLENGE OF GROWTH Ranjeet Nambudiri, S. Ramnarayan, and Catherine Xavier wrote this case solely to provide material for class discussion. The authors do not intend to illustrate either effective or ineffective handling of a managerial situation. The authors may have disguised certain names and other identifying information to protect confidentiality. This publication may not be...
What tools could AA leaders have used to increase their awareness of internal and external issues?...
What tools could AA leaders have used to increase their awareness of internal and external issues? ???ALASKA AIRLINES: NAVIGATING CHANGE In the autumn of 2007, Alaska Airlines executives adjourned at the end of a long and stressful day in the midst of a multi-day strategic planning session. Most headed outside to relax, unwind and enjoy a bonfire on the shore of Semiahmoo Spit, outside the meeting venue in Blaine, a seaport town in northwest Washington state. Meanwhile, several members of...