Threat Category |
Control |
Description |
Classification |
Type |
Accidental corruption of information |
Improper Designed systems |
A well-built designed system having adequate security measure can help in preventing the accidental corruption of information. |
Administrative |
Prevent |
Update security policy |
Current versions of software should be installed as they have their default security measures. |
Administrative |
Prevent |
|
Frequent use of backup files |
The backup files should be frequently accessed so that the purpose of backup can be achieved. |
Physical |
Prevent |
|
Regular troubleshooting application and system |
The most used applications and system should be trouble-shooted to minimize the issue of file corruption (Skaves 2015). |
Physical |
Prevent |
(Source: Created by the author)
Threat Category |
Control |
Description |
Classification |
Type |
Loss of intellectual Property |
NDA |
Intellectual property can be protected with the help of Non-Disclosure Agreement |
Physical |
Prevent |
Copy Right |
The intellectual properties can be saved from being lost or duplicated with the help of the copyright protection (Manzini and Lazzarotti 2016). The life of copyright protection has to be preset by the concerned organization or individual. |
Administration |
Compensate |
|
Trademarks |
The prime attributes of the intellectual properties can be protected with the use of the trademarks. The level of quality of the intellectual properties can also be retained with the help of trademarks. |
Administration |
Prevent |
|
Patents |
The intellectual properties can be saved with the help of legal rights known as patents. |
Administrative |
Prevent |
(Source: Created by the author)
Threat Category |
Control |
Description |
Classification |
Type |
Software Piracy |
Software Policy |
Efficient software policy should be adopted by individuals/organization to deal with software piracy |
Administration |
Prevent |
Anti-Piracy Statements |
The violations of the anti-piracy statement will lead to huge penalty for the individuals who will be associated with the software piracy (Asongu, Singh and Le Roux 2018). |
Administration |
Prevent |
|
Software inventories |
Keeping records about each minute details of the software including the licensing agreements. |
Physical |
Prevent |
|
Knowledge about software licenses |
The expiry date, updated versions and the other important details should be frequently evaluated to prevent the piracy of the software. |
Administrative |
Prevent |
(Source: Created by the author)
Threat Category |
Control |
Description |
Classification |
Type |
Theft of information (Hacker) |
Firewall |
The theft of information from a system can be avoided by frequently updating the inbuilt anti-virus systems. |
Product |
Detect |
Alphanumeric password |
Setting up complex passwords in the networking system can lead to the check of hacking issues. |
Administrative |
Prevent |
|
Anti-Malware software |
The anti malware software helps in the detection of intrusions within a system (Smith, Rabiti, and Szilard 2017). |
Product |
Prevent |
|
Limited user account |
The limited number of users in networking system can lead to the prevention of external threat agents. |
Administrative |
Prevent |
(Source: Created by the author)
Threat Category |
Control |
Description |
Classification |
Type |
Theft of information (Employee) |
Informal auditing |
Theft of employee information can be stopped with the help of internal auditing. |
Administrative |
Correct |
Tracking business checks |
The business checks are important for tracking all the ethical and unethical activities of the organization. |
Physical |
Correct |
|
Security systems |
The security systems can be effectively used for identification of the employees who are involved in theft of information (Nureni et al. 2016). |
Product |
Detect |
|
Employee supervision |
Supervision of employees can be used efficiently for the prevent of information theft. |
Administrative |
Prevent |
(Source: Created by the author)
Threat Category |
Control |
Description |
Classification |
Type |
Website Defacement |
Signature based detection technique |
The sniffing and logging activities in a website can be checked with the help of this technique. |
Physical |
Detect |
Anomaly based detection technique |
This technique involves monitoring of the high dynamic content of the websites with the help of sensors. |
Physical |
Detect |
|
Artificial intelligence |
Website defacement can be effectively prevented with the use of intelligent systems (Steinbart et al. 2018). |
Administrative |
Prevent |
|
Checksum calculation |
The website defacement can be effectively minimized with the help of the control activation algorithm. |
Administrative |
Correct |
(Source: Created by the author)
Threat Category |
Control |
Description |
Classification |
Type |
Theft of equipment |
Camera Surveillance System |
This instrument can be effectively used for the detection of the thieves associated with the theft of equipment’s. |
Product |
Detect |
POS System |
Theft of equipment can be stopped with the help of tracking activity of the POS systems (Kushwaha, Buckchash and Raman 2017). |
Product |
Detect |
|
Pre-employment check |
The theft of equipment’s can be controlled with the help of pre-employment check. |
Administrative |
Prevent |
|
Arrange shift wisely |
Management of the employees is simpler with the help of smaller teams. |
Administrative |
Prevent |
(Source: Created by the author)
Threat Category |
Control |
Description |
Classification |
Type |
Viruses, Worms, Trojan Horses |
Anti-spyware tools |
These tools are important for the detection of malicious activities from virus, worms and Trojan Horses. |
Product |
Prevent |
Up-to-date software |
Updated software’s have inbuilt security system (Chandana, Jilani, and Javeed Hussain 2015). |
Product |
Detect |
|
Rogue security software |
Helps to prevent against viruses and worms. |
Product |
Prevent |
|
Enable Firewall |
Malicious traffic are blocked with the help of the firewall |
Product |
Detect |
(Source: Created by the author)
Threat Category |
Control |
Description |
Classification |
Type |
Elevation of Privilege |
Microsoft Video Control |
Mishandling of the objects in memory can be effectively prevented with the use of Microsoft video control (Edge and O’Donnell 2016). |
Product |
Prevent |
SID filtering |
The risks associated with elevation of privilege can be effectively handled by the help of listing all the domains in an enterprise. |
Administration |
Prevent |
|
PAM |
Privileged Access Management can be effective used to manage the directory services for the escalations in the privilege accounts. |
Product |
Detect |
(Source: Created by the author)
Threat Category |
Control |
Description |
Classification |
Type |
Fire/ Flood |
Safety risk assessment |
Efficient risk assessment technique can be used for preventing flood and fire. |
Administrative |
Prevent |
Hazard Monitoring System |
The hazard monitoring system is used for detecting natural calamities like fire and flood (Haber and Hibbert 2018). |
Product |
Detect |
|
Smoke Detectors |
Smoke detecting systems can be used as an alert system from flood and fire. |
Product |
Detect |
|
Good Housekeeping |
Professional housekeeping practices can be very much used as a preventive measure from fires. |
Administrative |
Prevent |
|
Proper Waste Disposal |
Efficient disposal is important for the prevention of fire in an area. |
Administrative |
Prevent |
|
Flood warning systems |
The flood warning systems are the mostly used technology for the detection of floods. |
Product |
Detect |
(Source: Created by the author)
Reference
Asongu, S.A., Singh, P. and Le Roux, S., 2018. Fighting software piracy: some global conditional policy instruments. Journal of Business Ethics, 152(1), pp.175-189.
Chandana, R., Jilani, S. and Javeed Hussain, S., 2015. Smart surveillance system using thing speak and Raspberry Pi. International Journal of Advanced Research in Computer and Communication Engineering, 4(7), pp.214-218.
Edge, C. and O’Donnell, D., 2016. Malware Security: Combating Viruses, Worms, and Root Kits. In Enterprise Mac Security (pp. 221-242). Apress, Berkeley, CA.
Haber, M.J. and Hibbert, B., 2018. Privileged Account Management Implementation. In Privileged Attack Vectors (pp. 211-230). Apress, Berkeley, CA.
Kushwaha, P., Buckchash, H. and Raman, B., 2017, November. Anomaly based intrusion detection using filter based feature selection on KDD-CUP 99. In Region 10 Conference, TENCON 2017-2017 IEEE (pp. 839-844). IEEE.
Manzini, R. and Lazzarotti, V., 2016. Intellectual property protection mechanisms in collaborative new product development. R&D Management, 46(S2), pp.579-595.
Nureni, Y.N., Edwin, A.E., Kikelomo, A.A. and Harrison, A.O., 2016. E?Infrastructure and E?Services Security Platform Using Multifactor Cybercrime Deterrent System: A Conceptual Model.
Skaves, P., 2015, April. FAA Aircraft Systems Information Security Protection Overview. In Integrated Communication, Navigation, and Surveillance Conference (ICNS), 2015 (pp. A1-1). IEEE.
Smith, C., Rabiti, C. and Szilard, R., 2017. Risk-Informed Safety Margins Characterization (RISMC) Pathway Technical Program Plan (No. INL/EXT-17-43243-Rev000). Idaho National Lab.(INL), Idaho Falls, ID (United States).
Steinbart, P.J., Raschke, R.L., Gal, G. and Dilla, W.N., 2018. The influence of a good relationship between the internal audit and information security functions on information security outcomes. Accounting, Organizations and Society.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download