Discuss about the Assignment on It Risk Management.
The report of ENISA is based on the analysis and collection of threat information of the year 2014. “The changes have been analyzed which increases the attacks complexity and coordination of operation for the enforcement of the law” (Mateski, 2012). The changes has been observed in the cyber security community such as Botnet has control the communication between infected machines, Blackhole has reduced the use of exploit kit, DDos attacks are reduced due to the use of infected server, SQL injection is the main tool which is used for compromising with the website, and many more. From the research it has been observed that the core security protocols are named as SSL and TLS are under immense pressure and flaws are also encountered in the implementation. The year of 2014 is categorized as the year of data breach. The agents of cyber threats are effectively works on the leakages in the security programs of government and business. The violation of the privacy, increment in the sophistication, and others are some of the negative aspect of threat landscape. In the report, the topics such as list of top threats, their impact, ETL process, and others are clearly discussed in brief.
The security structure of ENISA is stands on five pillars which include defining the policy used for security, defining the scope of ENISA, assessment and management of risk, right choice in making the selection of control and lastly, the statement of applicability. The output of these pillars are developing the list of analyzed risk associated with the system, identification of weaknesses associated with the assets, strength of control used, documentation of the implemented application..
Strategies for combatting insider threats are discussed below:
Answer: The most significant attack is Denial of service attack because it can evolved due to sophistication, unpredictability, asymmetric, volumetric, computational, stealthiness, and others are some of the agents of threats. “The bandwidth of the attack is continuously growing in comparison to the time window” (Kumar, 2013). These attacks are usually come into existence with the combination of other attacks. In the coming future, volumetric attack will become the main attack. The detection of DDOS attack is difficult without the decryption of SSL traffic. The attacks of the application layer are the strong tools as they provide the significant impact on the application layer. The distributed denial of service attacks is most prominent where the source of attack is more than one and having unique IP addresses. This type of attacks usually occurs when one or more web servers re interconnected within the application.
The Key threats agents are listed below:
The cyber-attacks can be minimized by following emerging technologies:
Answer: Social hacking works on manipulating the outcome of action related to social behavior. Social hacking restrict the accessing of the information. “Social hackers take the significant steps to steal the personal information of the victim” (Anthony, 2012). There are number of social hacking techniques which can be categorized as dumpster driving, tailgating, roleplaying, spear phishing, and etc. Online social hackers are equipped with knowledge of social engineering which is helpful in analyzing and understanding the behavior of social targets.
From the table the trend in the probability of the cyber threats is that the ranking of the malicious code, botnets, denial of service, spam, phishing, data breaches, and information leakages is continuous increasing whereas web based attack, exploit kit, physical damage, and identity theft is continuously decreasing. “The steps should be taken to stop the growth of the cyber-attacks” (Vidalis, 2009).
The ETL process can be improved by focusing on the following areas:
From the table, it can be predicted that denial of service attack and insider threats will be the most challenging issues for combatting in the year 2016. The bandwidth of the attack is continuously growing in comparison to the time window. These attacks are usually come into existence with the combination of other attacks. In the coming future, volumetric attack will become the main attack. The detection of DDOS attack is difficult without the decryption of SSL traffic.The distributed denial of service attacks are most prominent where the source of attack is more than one and having unique IP addresses. This type of attacks usually occurs when one or more web servers re interconnected within the application.Training should be provided to the employees for recognizing phishing and other insider threats related to social media vector. The usage of software should be improved for reducing the likelihood of human error which results into the insider threats.
ENISA is satisfied with the current state of IT security because it works on improving the business life, it makes the bridge between engineered system and cyber space, surveillance is the effective tool used for cyber threat landscape, and others. The major concern of the security expert is the unknown occurrence of data breaches. “The development of the new security measures takes place with every attack which takes place on the computer system” (Andrew, 2011). There is a continuous increment in the sophistication of the cyber-attack. There is a major challenge for the trust infrastructure. From the research it has been observed that the core security protocols are named as SSL and TLS are under immense pressure and flaws are also encountered in the implementation. The violation of the privacy, increment in the sophistication, and others are some of the negative aspect of threat landscape. The solution of the data breaches is depends on the usage of data. Big data, mobile computing social media should be properly used for preventing the information from data breaches.
References:
Mateski, M. (2012). Cyber threats metrics (1st ed.). New Mexico. Retrieved from https://nsarchive.gwu.edu/NSAEBB/NSAEBB424/docs/Cyber-065.pdf
Kim, D. (2013). Cyber threats trend analysis model using HMM (1st ed.). Retrieved from https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.331.3416&rep=rep1&type=pdf
Kumar, A. (2013). Social networking sites and their security issues (1st ed.). Retrieved from https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.300.4675&rep=rep1&type=pdf
Gupta, S. (2010). Social engineering the art of human hacking (1st ed.). Retrieved from https://sin.thecthulhu.com/library/security/social_engineering/The_Art_of_Human_Hacking.pdf
Gu, Q. (2007). Denial of service attack (1st ed.). Retrieved from https://s2.ist.psu.edu/paper/ddos-chap-gu-june-07.pdf
Anthony, W. (2012). Denial of service attack in sensor network (1st ed.). Retrieved from https://www.cs.virginia.edu/~stankovic/psfiles/computer02-dos.pdf
Vidalis, S. (2009). Analyzing of threat agent and their attributes (1st ed.). Retrieved from https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.104.6908&rep=rep1&type=pdf
Andrew, J. (2011). Threat agent library helps identify information security risks (1st ed.). Retrieved from https://www.sbs.ox.ac.uk/cybersecurity-capacity/system/files/Intel%20-%20Threat%20Agent%20Library%20Helps%20Identify%20Information%20Security%20Risks.pdf
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download