Chat with us, powered by LiveChat Develop a comprehensive analysis that identifies threats and vulnerabilities to the information systems infrastructure and organi - Writeedu

Develop a comprehensive analysis that identifies threats and vulnerabilities to the information systems infrastructure and organi

  1. Phase 1 of Final Project: Develop a comprehensive analysis that identifies threats and vulnerabilities to the information systems infrastructure and organizational data.
  2. You may use a fictitious company, one that you researched on the Internet, or your own workplace (although you should use an alias for the company name).
  3. Conduct Internet research for formats that are used for a threat analysis.
    1. Include a short executive summary for this assignment, although you will need to revise this summary for the final paper.
    2. The threat analysis should be approximately 4 to 5 pages in length, in APA format, and double-spaced for the narrative.
    3. You may use tables or other graphic representations.
    4. The paper should include references to any material used in preparing the paper. References are to be cited within your paper as well as on the Reference page using APA format.
    5. You should use online resources to develop your plans; just make sure to cite these sources. All written work should be your own.

1

2

Security Incidents

Name

Institution Affiliation

Course

Date

Security incidents are events that might indicate that a company’s data or systems have been compromised or various measures that were implemented to protect the systems and data have failed. Some of the current security incidents include privilege escalation attacks, phishing attacks, insider threats, and unauthorized attempts to access data or systems. Other security incidents consist of advanced persistent threats, web application attacks, denial of service attacks, and malware attacks. Most of the vulnerabilities that cause such incidents can be attributed to attack vectors that enable cybercriminals to exploit data or systems. Hackers are able to gain access to a network server or computer through attack vectors in order to deliver a negative outcome (Nestler et al., 2010). Some of those attack vectors include viruses and deception. Insider threats are security incidents that are commonly attributed to current or former employees and third parties like customers, temporary workers, and contractors.

One of the biggest security incidents that have been experienced today in many organizations is phishing attacks. This security incident presented various short and long-term effects on the organization, which greatly affected its operations and production. Some of the short-term effects of phishing attacks include loss of data, financial penalties, and intellectual property theft (Summer, & Yuan, 2019). The organization also faced long-term effects like loss of company value, loss of customers, loss of productivity, and damaged reputation. The organization suffered reputation loss due to data breaches that were executed through phishing attacks. Many customers lost trust in the firm besides the attack exerting a negative effect on the company's brand.

Some of the ways of mitigating phishing attacks include:

· Having a data security platform to spot signs of an attack

· Installing firewalls

· Changing passwords regularly

· Getting free anti-phishing add-ons

Those security policies can be implemented by updating the corporate security policy educating and monitoring employees. This will ensure that employees do what is right to safeguard the organization's data and systems and avoid sharing any sensitive data with outsiders.

References

Nestler, V., White, G., Conklin, A. Wm., Hirsch, M., & Schou, C. (2010). Principles of Computer Security.

Sumner, A., & Yuan, X. (2019, April). Mitigating phishing attacks: an overview. In Proceedings of the 2019 ACM Southeast Conference (pp. 72-77).

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteEdu. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

Do you need help with this question?

Get assignment help from WriteEdu.com Paper Writing Website and forget about your problems.

WriteEdu provides custom & cheap essay writing 100% original, plagiarism free essays, assignments & dissertations.

With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.

Chat with us today! We are always waiting to answer all your questions.

Click here to Place your Order Now