Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.

QUESTION

Complete 4 page APA formatted essay: RCP 1 End of Chapter 1 H.W.The company’s network comprises of the basic information security measurements. the C.I.A triangle. This is another assumption because

Complete 4 page APA formatted essay: RCP 1 End of Chapter 1 H.W.

The company’s network comprises of the basic information security measurements. the C.I.A triangle. This is another assumption because all network security companies rely on this triangle as fundamentals of their business. Confidentiality, integrity and availability are the prime reasons why clients trust backup companies like Data Mart with their confidential information. An example of how Data Mart protects its data from untrusted network is shown in this diagram.

The main asset category at Data Mart falls under intellectual assets, be it their staff or the company information they store in their 200 rack mounted servers. The assumptions are that the company has a simple setup of a typical backup protection company that offers additional services of data analysis. Here is a brief list of organization’s assets.

Data Mart faces all those threats that can damage its data or somehow compromise its integrity that the customers trust it with. Network connections create the possibility of spilling problems due to an exogenous or endogenous attack that depends on the profile of security investments (Acemoglu, Malekian, & Ozdaglar, 2013).&nbsp. Here are some specific threats that Data Mart faces.

Bypassing the access controls is one of the favorite attacks. Making educated guesses about passwords or trying every possible combination of numbers and letters makes them finally guess the right password.

In a denial-of-service (DoS) attack, the assailant sends a number of requests to the target. So, numerous requests are made that the system cannot appendage them. The system can crash or it may just be unable to accomplish different functions. In Distributed Denial of Service (DDoS) the attacker(s) launches an integrated number of requests against an entity from numerous locations simultaneously.

These threats include Trojan horses, viruses, worms, active web scripts etc. meant to destroy of steal

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question