Monday, June 10, 2019

RCP 1 End of Chapter 1 H.W Assignment Example | Topics and Well Written Essays - 1000 words

RCP 1 End of Chapter 1 H.W - Assignment ExampleThe companys network comprises of the basic information security measurements the C.I.A triangle. This is another assumption because all network security companies rely on this triangle as fundamentals of their business. Confidentiality, integrity and availability argon the prime reasons why clients trust backup companies like Data Mart with their confidential information. An example of how Data Mart protects its info from untrusted network is shown in this diagramThe main summation category at Data Mart falls under intellectual assets, be it their staff or the company information they store in their two hundred rack mounted servers. The assumptions are that the company has a simple setup of a typical backup protection company that offers additional services of data analysis. Here is a brief list of organizations assetsData Mart faces all those threats that can damage its data or somehow agree its integrity that the customers trust it with. Network connections create the possibility of spilling problems due to an exogenous or endogenous attack that depends on the profile of security investments (Acemoglu, Malekian, & Ozdaglar, 2013). Here are some specific threats that Data Mart facesBypassing the access controls is one of the favorite attacks. Making educated guesses about passwords or trying every possible crew of spots and letters makes them finally guess the right password.In a denial-of-service (DoS) attack, the assailant sends a number of requests to the target. So, numerous requests are made that the system cannot addition them. The system can crash or it may just be unable to accomplish different functions. In Distributed Denial of Service (DDoS) the attacker(s) launches an integrated number of requests against an entity from numerous locations simultaneously.These threats include Trojan horses, viruses, worms, active web scripts etc. meant to destroy of steal

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.