Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Data at rest threats

19/03/2021 Client: saad24vbs Deadline: 2 Day

1 page table is required, you can use all tables to make one

Create a 1-page table in Microsoft® Word or Excel® listing a minimum of five threats using the column headers Threat to Data-at-Rest, Confidentiality/Integrity/Availability, and Suggestion on Countering the Threat.

In the Confidentiality/Integrity/Availability column, identify whether each of the following are affected:

· Confidentiality

· Integrity

· Availability

· Some or all of the three (Confidentiality, Integrity, and/or Availability)

Include suggestions on how to counter each threat listed.

Place your list in the 3 columns of a table in a Microsoft® Word or Excel® document.

Submit your assignment using the Assignment Files tab.

Protecting Data

Threat to Data-at-Rest

Confidentiality

Affected?

Integrity

Threat

Availability

Threat

Suggestions on how to counter Threat

Denial of Service (DoS) to company website (not accessible), or to computer software / hardware (power failure) / Temporary loss of data or services that may or may not be restored (Smith, 2016).

Yes

Risk can be countered for website transactions by implementing an alternative method of accepting payments (in-store); or for computer hardware/software by installing an uninterruptable power supply (UPS) to allow systems to function without power.

Identity Theft / Threat to customers regarding identity theft, fraud, theft of funds, etc. and threat to organization storing the data regarding lawsuits, exposure to loss, etc.

Yes

Yes

Risk can be countered by encrypting data, educating consumers to keep account numbers secure, and identifying any vulnerability in the system where data can be accessed.

Disclosure / Threat of confidential company data being exposed to others who are not authorized to view it.

Yes

This type of threat can be countered by implementing complex passwords on laptops and desktops to protect company data exposure.

Masquerade / Access to company network via user who pretends to be the real user and sends messages or manipulates electronic data. Risk of Identity theft.

Yes

Yes

Response to counter this type of threat is to implement a layered security structure. Limiting access via Least Privilege Controls would be a good defense.

Physical Damage to Data or Hardware / According to TrustedComputingGroup.org (2017), “Data backup, off-site mirroring, and other data replication techniques may increase the risk of unauthorized access” or loss. (p. 1, Solutions Guide for Data at Rest).

Yes

Yes

Data stored off-site should definitely be encrypted. If possible, using several layers of encryption is a viable solution. Backups are a critical factor in recovering from this type of threat.

Ransomware / Liability would be greater and damages can be extreme, if no backups exist then company will have to pay a ‘ransom’ to get the encryption key to unencrypt their data files and restore them.

Yes

Yes

Yes

The best defense of this type of threat is to have a service such as Datto and a Datto backup continuity device installed so that the entire company’s data is backed up on scheduled intervals. This would alleviate the need to pay cyber criminals a monetary ransom to get the encryption key to unlock a company’s data.

Physical Loss / Stolen/Lost mobile devices containing sensitive company data.

Yes

Yes

Yes

Applications are available to install on mobile devices that allow users to wipe their device remotely. This would help secure stored data at rest on mobile devices.

Subversion / Viruses, Worms, and Botnets can infiltrate company website and download malware through company network/files/database.

Yes

Yes

Yes

Periodic updates to anti-virus software will be a necessity in keeping the system free of potential security breaches.

Table 1. Cyber Threats and Risks for CIA (2017).

References

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Professional Coursework Help
Engineering Guru
Top Quality Assignments
Top Class Engineers
Quick Mentor
Coursework Helper
Writer Writer Name Offer Chat
Professional Coursework Help

ONLINE

Professional Coursework Help

I will cover all the points which you have mentioned in your project details.

$63 Chat With Writer
Engineering Guru

ONLINE

Engineering Guru

I have read and understood all your initial requirements, and I am very professional in this task.

$57 Chat With Writer
Top Quality Assignments

ONLINE

Top Quality Assignments

Give me a chance, i will do this with my best efforts

$63 Chat With Writer
Top Class Engineers

ONLINE

Top Class Engineers

Hello, I an ranked top 10 freelancers in academic and contents writing. I can write and updated your personal statement with great quality and free of plagiarism

$44 Chat With Writer
Quick Mentor

ONLINE

Quick Mentor

I have read and understood all your initial requirements, and I am very professional in this task.

$54 Chat With Writer
Coursework Helper

ONLINE

Coursework Helper

Hello, I an ranked top 10 freelancers in academic and contents writing. I can write and updated your personal statement with great quality and free of plagiarism

$30 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Developing geometric thinking through activities that begin with play - Pwc compario - Grade boundaries for a level psychology - Research Paper - "What it Takes to Become A Manager" - Bank alfalah car financing pakistan - Steps to follow for analyzing an ethical dilemma - Data mining: 5 questions with 300 words each answer. (APA citations, No plagarism, ) - Customer complaint role play script - Insanity case study - Slavery - James hardie easylap installation - Persuasive speech on tanning beds - Action buttons in powerpoint - Lg electronics usa englewood cliffs nj - Amp lost policy declaration form - ________ is the tendency for supervisors to base judgments on readily obtainable information. - Stone age activity sheets - 4 bit binary to grey code converter - Five elements of management - George and lennie's dream - How to make an airbag with baking soda and vinegar - Walmart case study - Chemical name for nh4 3po4 - Self esteem mad lib pdf - Lenny scares mr burns - Vce english oral presentation example - Epidemiology for public health practice study guide - Ancient history syllabus qld - Articlee writing - How to bypass edexcel login - Oxy acetylene safety rules - Organizational structure of fda - An aerialist on a high platform holds - Report on recent attack at office of Personnel Management - Sephora direct investing in social media video and mobile - Teacher training personal statement - Khp naoh net ionic equation - Pittman company is a small but growing - What is a watch glass used for in science - Ktea 3 subtest descriptions - Experiment 2: effect of temperature on enzyme activity - Insufficient firewall fragments destiny 2 - Australian refrigeration council licence check - Walt disney informative speech - Georgia pacific a manufacturer incurs the following costs - What is computer room management ethics - Comin thro the rye analysis - Scaruffi boards of canadascaruffi boards of canada - Cmgt 545 question - Hexcel prepreg data sheets - What is beauty care in tle - Of mice and men racism quotes - Duplication of column in a table derived table teradata - Imago dei meaning in christianity - How early years settings meet children's rights to play - Newspaper balanced scorecard - Rationale for marketing channel structures - Soc 120 week 1 discussion 2 - Windshield survey powerpoint presentation - They say i say online - Gibson 498t wiring diagram - Sales revenue may be recorded before cash is collected - Bsbpmg522a undertake project work answers - Professional capstone and practicum reflective journal - Greasy lake questions - The pcv system controls which exhaust emission s - Assignment needed by Sat @ 6pm - The hobbit discussion questions and answers - Blank coat of arms - Find assignment 2 and answer all the questions clearly. - Treating a Patient with Psychosis - 2 pages - Inspector goole final speech analysis - 100 spelling words for 5th grade - Nhs leadership academy 2013 - Active file recovery ultimate - Math- Roller Coaster Polynomial Assignment - Major rules of badminton - The book of micah presents a divine lawsuit - Extraordinary journeys safari - Ethics and accountability in public administration - What is rms number - Sink or swim classroom game - Ted bundy childhood biography - My siren's name is brick and she is the prettiest - Project - The practice of statistics 5th edition answer key pdf - Three specimens for total gastric acid cpt code - Data-driven decision making - Juror 11 12 angry men - Lección 4 estructura 4.2 autoevaluación verbos contar - Think safe work safe home safe - Cultural ethos quiz gcu answers - Wind turbine activity worksheet - Create a brochure for parents and community members that illustrates the main points of Sheltered English Immersion - South morang primary school - Marketing management mcqs with answers - Juris doctor uwa handbook - Managerial economics - Ipolis mobile setup android - Center for creative leadership leadership development program