ITECH 3215
INFORMATION SECURITY
MINOR ASSIGNMENT
THREAT PROFILING
VIVEK CHARY DADUVAI (30312832)
Contents
Summary 3
Introduction 3
Profile of Threat 3
Profile Completion 4
Situational crime Prevention 4
Law 6
International scope 6
Conclusion 7
Reference 8
Summary
Computer security is the security applied to the computers and their networks including the internet. Physical security and information security are the two types of computer securities which prevent theft of equipment and data. (Man, 2015).
Security vulnerabilities can be defined as an unintended flaw in the system that leaves opportunity for unauthorized access of malicious software such as viruses, Trojans, worms and other malwares. It can result from bugs in software and weak passwords. These require fixes in order to prevent the integrity of the system compromised by hackers or malwares. Hackers try to steal sensitive data such as corporate or personal information.
Introduction
The most common operating system, Microsoft Windows is used to connect the systems to the internet and hence contains various vulnerabilities. Internet Explorer, MS-SQL, file serving and message processing services are the most commonly exploited services of the operating system. There is no operating system that does not contains vulnerabilities and exposures and cannot be targeted by the hackers and viruses. The vulnerabilities in Windows are more popular because of the huge number of machines running it. (Zibstev
On September 24, 2010, a laptop was stolen from an unlocked Urology office at the Henry Ford Health Systems hospital. The laptop did contain password protection software; however, it may not have been enough to permit access if the thief had advanced knowledge in computers. Additionally, the information stored on the laptop did not include social security or health insurance information, but instead held “patient names, medical record numbers, dates of birth, telephone numbers, e-mail addresses, and treatment and doctor visits” (Moscaritolo, 2010, p. 1). It is unknown how many records were contained on the laptop, but all records were related to prostate services that were provided during an eleven year span.
Using proxy software Burp Suite it was discovered that the shopping site contained a hidden form field that could be manipulated.
Security in computing is the act of detecting and preventing unauthorized access to your computer or computer system. This can be done in many ways but is predominately done by security tools, maintaining a computer system is keeping its security definitions up to date and keeping the security update and updates in general up to date, there are more computer viruses then people in the world and there are viruses being developed and distributed on a daily basis, because some of the viruses released that get released can be fatal to computer systems anti-virus companies try to release updates on a daily basis to counteract the effects of these viruses. This is why computer maintenance is essential in a computing network.
Both Wireshark and NetWitness Investigator can be used for packet capture and analysis. Which tool is preferred for each task, and why?
I am currently on an Information Security Project. I was not allow to make ref to it until permission is grant by VP. The ABC hospital is a local hospital situated in Texas State. ABC hospital patient currently accesses their heath records over public network. However, ABC hospital believed network application should be strongly encrypted with guaranteed confidentiality, authentication and integrity. The ABC hospital plan is to have a networked application built securely and provide high availability as well as protecting information. If the network application is securely build as plan, the hospital will be able identify the authoritative source of data indicating where the data is coming from and knowing to what extent the hospital can
Following the security breach that this corporation they had investigation into what happened in the security breach they need to find out who was involve in the breach . I need to also let the manage of the corporation know what was going on and what kind of plan I have come up with to deal with this. I have to determined if this breach is of the appropriate magnitude, if I need to share it with press or not . As the tech for the information system department at this corporation .I need to make sure that I will give notify the department in which the breach happened. I will provide a brief description of the security breach that happened. I also need to make sure that I compromised shall be notified in the most expedient time as possible
Introduction: - for my research project, I would like to explore about the cyber security measures. Cybersecurity covers the fundamental concepts underlying the construction of secure systems from the hardware to the software to the human computer interface, with the use of cryptography to secure interactions. These concepts are easily augmented with hands-on exercises involving relevant tools and techniques. We have different types of computer related crimes, cybercrimes, computer related offenses, federal approaches defenses. The information resources management has the technical matters for which IT are widely known. Cyber resources and cyber power as well as cyber security. We have spent a lot of time talking about many different high level critical infrastructure protection concepts we have general rule stayed away from cyber security explaining the ins and out of how the NIPP and NRF work together to ensure that we can live our daily live in relative comfort.
What is Operating System Security, Operating system security is the process of ensuring OS integrity, confidentiality and availability also OS security refers to specified steps used to protect the OS from threats, viruses, worms, malware or remote hacker. OS security include all avoiding-control techniques, which safeguard any computer information from being stolen, edited or deleted if OS security is included. OS security allows different applications and programs to perform required tasks and stop unauthorized interference. OS security may be applied in many ways. We 're going to discuss following topics in this article. A brief description about security and what are the types of encryption and what is Authentication, One Time passwords, Program Threats, System Threats and Computer Security Classifications.
Faults are a precise interaction of hardware and software that can be fixed given enough time.
Americans are becoming heavily dependent on modern day technology, which produce more vulnerability to cyber-attacks such as security breaches. Cyber security, also known as information technology security, is information security as applied to computers and computer networks. It is designed to protect networks, programs, computers and data from attacks. These attacks can lead to damages or unauthorized access to data. Computer security also includes protection from unplanned events and natural disasters. Cyber security main function is to guard computers, networks, programs and data from unintended or unauthorized access, change or destruction.
Answer: Information Security is the practice of defending (guiding) information by considering the CIA Triad Principles which are Confidentiality (Authorize access), Integrity (Accuracy and Completeness) and Availability.
Outsider attackers often called hackers because they gain access to system without authorization or permission from the owners or legitimate user. With information technology, comes increase risk of fraud and information theft. Hackers can steel sensitive information from one organization and sell it to a
A threat agent is the facilitator of an attack however; a threat is a constant danger to an asset.
Prevalent to the current trend now is the dependency of the society on Information technology and communication systems. Every aspect of human life is one way or the other linked and controlled by information technology tools. The importance of information technology cannot be over emphasized as its unavailability could lead to a form of disaster or the other. Pivotal infrastructures like finance, healthcare, education and security are driven by information technology. However, information technology and its benefits are accompanied by vulnerabilities and risks that can be exploited by people with the necessary technical skills. Individuals like ‘Hackers’ and ‘Cyber Terrorist’ can cause disruption to information systems, commit financial fraud and also attack computers and networks. These attacks and disruptions could result to violence against people and properties. In some cases, death, serious injuries and severe economic loss could occur as a result of these attacks.
Cyber Security also called computer security and IT security, is the assurance of data from theft or any harm to the gadget, the product and information stored on hardware. It incorporates controlling physical access to the equipment and additionally ensuring against code or data injection or via network access.