IT Security Risk Exercise 3
Questions :-
1. In what ways can IT be used to detect unauthorized access - benefits and drawbacks ?
2. In what ways can IT be used to detect and defend against damage to data and equipment ?
3. Discuss the importance of organisational security. Demonstrate how organisational security could affect business continuance.
4. Identify and provide THREE (3) examples of security breaches.
5. Discuss how business operation could be affected by a security breach.
6. Make a scenario where a security breach has a major operational impact and create a solution to recover from the breach.
Answers :-
1. The unauthorized access is when someone gain access to a website, program, server, service, or other system using someone else's account or other methods. It can be detected by monitoring the PC. The benefits of monitoring PC is when the PC is monitored all the times, it can avoid a strange files to pass through, and always check the system logs. therefore, they could see who has entered the security system or who has logged in.The drawbacks of detecting the unauthorized access in IT is The PC or any system can get a physical damage by the intruders.
2. Detect and defend against damage to data and equipment means avoiding a duplication of data from the intruders. There are many people in a company and they can become an intruders at anytime, the way how to prevent the duplication is provide an IT security guards.
3. The organisational security is very important for a company. It is a good way on how to avoid from a security breaches, like a virus for instance. As for the business continuance, organisational security will make sure there will be no one can access the information easily in that company, especially when the company is currently running an information of a database that relates to customer's information, or strategy of their business plan.
4.
6. A security breach has happened on a rollback store when there is one staff who steal many stuffs or items inside the store by switching off a CCTV quietly during the manager is not around. By switching off the CCTV, the staff takes that time as his opportunity for stealing. The solution for this problem is by Monitoring with many CCTV. Not just one CCTV but many.
1. In what ways can IT be used to detect unauthorized access - benefits and drawbacks ?
2. In what ways can IT be used to detect and defend against damage to data and equipment ?
3. Discuss the importance of organisational security. Demonstrate how organisational security could affect business continuance.
4. Identify and provide THREE (3) examples of security breaches.
5. Discuss how business operation could be affected by a security breach.
6. Make a scenario where a security breach has a major operational impact and create a solution to recover from the breach.
Answers :-
1. The unauthorized access is when someone gain access to a website, program, server, service, or other system using someone else's account or other methods. It can be detected by monitoring the PC. The benefits of monitoring PC is when the PC is monitored all the times, it can avoid a strange files to pass through, and always check the system logs. therefore, they could see who has entered the security system or who has logged in.The drawbacks of detecting the unauthorized access in IT is The PC or any system can get a physical damage by the intruders.
2. Detect and defend against damage to data and equipment means avoiding a duplication of data from the intruders. There are many people in a company and they can become an intruders at anytime, the way how to prevent the duplication is provide an IT security guards.
3. The organisational security is very important for a company. It is a good way on how to avoid from a security breaches, like a virus for instance. As for the business continuance, organisational security will make sure there will be no one can access the information easily in that company, especially when the company is currently running an information of a database that relates to customer's information, or strategy of their business plan.
4.
- Sniffing - Sniffing if peeking someone's information or data through a network, for example wifi.
- Exploiting security weaknesses - exploiting means taking advantages or benefits from other resources. It come in all shapes and sizes, but some techniques are used more often than others. one of the common website is visiting a website and get tricked by the exploiter.
- Social engineering - Social engineering is an attack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.
6. A security breach has happened on a rollback store when there is one staff who steal many stuffs or items inside the store by switching off a CCTV quietly during the manager is not around. By switching off the CCTV, the staff takes that time as his opportunity for stealing. The solution for this problem is by Monitoring with many CCTV. Not just one CCTV but many.
Comments
Post a Comment