Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Data at rest threats

19/03/2021 Client: saad24vbs Deadline: 2 Day

1 page table is required, you can use all tables to make one

Create a 1-page table in Microsoft® Word or Excel® listing a minimum of five threats using the column headers Threat to Data-at-Rest, Confidentiality/Integrity/Availability, and Suggestion on Countering the Threat.

In the Confidentiality/Integrity/Availability column, identify whether each of the following are affected:

· Confidentiality

· Integrity

· Availability

· Some or all of the three (Confidentiality, Integrity, and/or Availability)

Include suggestions on how to counter each threat listed.

Place your list in the 3 columns of a table in a Microsoft® Word or Excel® document.

Submit your assignment using the Assignment Files tab.

Protecting Data

Threat to Data-at-Rest

Confidentiality

Affected?

Integrity

Threat

Availability

Threat

Suggestions on how to counter Threat

Denial of Service (DoS) to company website (not accessible), or to computer software / hardware (power failure) / Temporary loss of data or services that may or may not be restored (Smith, 2016).

Yes

Risk can be countered for website transactions by implementing an alternative method of accepting payments (in-store); or for computer hardware/software by installing an uninterruptable power supply (UPS) to allow systems to function without power.

Identity Theft / Threat to customers regarding identity theft, fraud, theft of funds, etc. and threat to organization storing the data regarding lawsuits, exposure to loss, etc.

Yes

Yes

Risk can be countered by encrypting data, educating consumers to keep account numbers secure, and identifying any vulnerability in the system where data can be accessed.

Disclosure / Threat of confidential company data being exposed to others who are not authorized to view it.

Yes

This type of threat can be countered by implementing complex passwords on laptops and desktops to protect company data exposure.

Masquerade / Access to company network via user who pretends to be the real user and sends messages or manipulates electronic data. Risk of Identity theft.

Yes

Yes

Response to counter this type of threat is to implement a layered security structure. Limiting access via Least Privilege Controls would be a good defense.

Physical Damage to Data or Hardware / According to TrustedComputingGroup.org (2017), “Data backup, off-site mirroring, and other data replication techniques may increase the risk of unauthorized access” or loss. (p. 1, Solutions Guide for Data at Rest).

Yes

Yes

Data stored off-site should definitely be encrypted. If possible, using several layers of encryption is a viable solution. Backups are a critical factor in recovering from this type of threat.

Ransomware / Liability would be greater and damages can be extreme, if no backups exist then company will have to pay a ‘ransom’ to get the encryption key to unencrypt their data files and restore them.

Yes

Yes

Yes

The best defense of this type of threat is to have a service such as Datto and a Datto backup continuity device installed so that the entire company’s data is backed up on scheduled intervals. This would alleviate the need to pay cyber criminals a monetary ransom to get the encryption key to unlock a company’s data.

Physical Loss / Stolen/Lost mobile devices containing sensitive company data.

Yes

Yes

Yes

Applications are available to install on mobile devices that allow users to wipe their device remotely. This would help secure stored data at rest on mobile devices.

Subversion / Viruses, Worms, and Botnets can infiltrate company website and download malware through company network/files/database.

Yes

Yes

Yes

Periodic updates to anti-virus software will be a necessity in keeping the system free of potential security breaches.

Table 1. Cyber Threats and Risks for CIA (2017).

References

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Professional Coursework Help
Engineering Guru
Top Quality Assignments
Top Class Engineers
Quick Mentor
Coursework Helper
Writer Writer Name Offer Chat
Professional Coursework Help

ONLINE

Professional Coursework Help

I will cover all the points which you have mentioned in your project details.

$63 Chat With Writer
Engineering Guru

ONLINE

Engineering Guru

I have read and understood all your initial requirements, and I am very professional in this task.

$57 Chat With Writer
Top Quality Assignments

ONLINE

Top Quality Assignments

Give me a chance, i will do this with my best efforts

$63 Chat With Writer
Top Class Engineers

ONLINE

Top Class Engineers

Hello, I an ranked top 10 freelancers in academic and contents writing. I can write and updated your personal statement with great quality and free of plagiarism

$44 Chat With Writer
Quick Mentor

ONLINE

Quick Mentor

I have read and understood all your initial requirements, and I am very professional in this task.

$54 Chat With Writer
Coursework Helper

ONLINE

Coursework Helper

Hello, I an ranked top 10 freelancers in academic and contents writing. I can write and updated your personal statement with great quality and free of plagiarism

$30 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Sensible perspiration released by the eccrine sweat glands serves __________. - Accounting Paper - Just walk on by a black man ponders comprehension - Doc martin theme sheet music - EP WK5 - Adjustable pitch airboat propeller - Heart rate experiment lab report - IOT technologies and applications in eHealth using Data Mining, Phd REASERCH PAPER< URGENT - Skullcandy earphones made in which country - Www dolphinhousesurgery co uk - Topic 5 DQ 2 - Cash flow statement hsc - Air takes up space tissue in a cup - Vitaly borker net worth - Frl 264 relay datasheet - What might happen if business strategy was not the driver - Suicide among law enforcement - The processes of photosynthesis and cellular respiration are complementary - Exam - A helicopter is ascending vertically - Macbeth act 3 discussion questions answers - My Novel: The Hunger Games (Hunger Games Trilogy, Book 1) Special Edition - Social order crimes - Dramatic tenor vocal range - Identifying permanent accounts - Determine the magnetic field at point p - Selected comparative financial statements of korbin company follow - Blood donor carer jobs - Relational Stages - Will smith pursuit of happiness speech - How to find seasonal index - Leopold maneuver steps ati - Discussion And Reflections(Essary)- W8 - Network management tools associated with policy compliance - Trench warfare lesson plan - Dcc concepts point wiring - Pilot air compressor ns39 - When the tulip bubble burst ielts - Hotondo homes mount gambier - Days that changed america - What is authoring system - How is confidentiality ensured using the ipsec vpn protocol? - Watch the execution of wanda jean - Kwh to watts conversion calculator - Pitot tube traverse calculation - Introduction to typography ppt - Arcing fault current calculation - Miriam rose ungunmerr baumann biography - How is lymph returned to the blood - Assessment Tools - Nike pricing strategy - Barry chi and holly chen net worth - Curtin malaysia exam timetable - Chasseur de bolides counting cars supercharged - Master data services add in for excel - Www boq com au internet banking - Volitional questionnaire version 4.1 - What is a broadsheet - For Essays Guru - - Credibility of consumer health digest - Sres lópez la mantequilla por favor - History of geography ppt - WOrLd fAmOUs aStROlogEr+91-9924492424 LoVe vAshikArAn sPEciALisT Baba Ji - Java - Nmap is a type of vulnerability scanner - How was the institution of slavery established in the American colonies? How did the American Revolution impact slavery? - Three ethical theories - 13 reasons why real tapes - Morgan salas & glickman's team model - Muslim Molvi 7340613399 OnLine No 1 FaMOUs VashIKaraN sPecIaLIsT IN Rohtak - The story of an hour analysis pdf - Order # 11058 - Discussion Question - The second coming litcharts - Dateline a knock at the door tara - Macbeth act 1 scene 3 analysis - What is a sacrement - Strategic Communications Plan - Lewin's change model strengths and weaknesses pdf - Magazine cover dimensions photoshop - Grob's basic electronics 12e answer key - What are the family resources and needs - Social Work Discussion Questions - InfoTech Import - Dua of istikhara transliteration - Norwegian police university college - How has new belgium implemented the marketing concept - THE NATIONAL SOCIETY OF LEADERSHIP AND SUCCESS essay - Infosys intellectual property rights quiz - The opportunity cost of producing one more quart of olive oil in greece is - 3 1 11x expand - Powerpoint hymns with music - Pearson brothers recently reported an ebitda - The nature of theoretical thinking in nursing - Case Study 1 & 2 - Debriefing and Progress Report - Add force unity 2d - Advanced diploma whs rpl - Burpengary western performance club - The writing life annie dillard chapter summaries