Answered You can hire a professional tutor to get the answer.
Write 1 page essay on the topic Information Security Management.The GhostNet systems also facilitate downloading of a Trojan called Ghost Rat that enables attackers to have control of the attacked sys
Write 1 page essay on the topic Information Security Management.
The GhostNet systems also facilitate downloading of a Trojan called Ghost Rat that enables attackers to have control of the attacked systems on a real-time basis(Villenueve & Walton, 2009). That makes monitoring and identification of security breach a complicated process. The fact that it can operate the web cameras and microphones is just beyond.The system is not able to achieve the expected security in operation especially after an attack by GhostNet since it can send email messages from the infected systems to other users alluding to be the authenticate persons. The detecting users become victims since these emails have malware spread-out to them.b)The detail in the headings below how might apply each of the SSE processes in the above diagram have helped the case study organizations to avoid their vulnerabilities being exploited?PA02-5 Assess Impact. Security Risk. Threat. VulnerabilityThe result will be forming a foundation for security that will address requirements both in the organization, meet the needs of the policies and the law. It helps achieve set security objectives in the system.PA10 Specify Security NeedsIt involves identification of particular security that affects the system in the case apart from the general threats. That will ensure that the solutions derived directly address the particular system.PA09 Provide Security InputIt ensures that the designing of the system and it's architecting is based on the security needs initially identified.