Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Threats to data at rest

22/12/2020 Client: saad24vbs Deadline: 3 days

1 page table is required, you can use all tables to make one


Create a 1-page table in Microsoft® Word or Excel® listing a minimum of five threats using the column headers Threat to Data-at-Rest, Confidentiality/Integrity/Availability, and Suggestion on Countering the Threat.


In the Confidentiality/Integrity/Availability column, identify whether each of the following are affected:


· Confidentiality


· Integrity


· Availability


· Some or all of the three (Confidentiality, Integrity, and/or Availability)


Include suggestions on how to counter each threat listed.


Place your list in the 3 columns of a table in a Microsoft® Word or Excel® document.


Submit your assignment using the Assignment Files tab.


Protecting Data


Threat to Data-at-Rest


Confidentiality


Affected?


Integrity


Threat


Availability


Threat


Suggestions on how to counter Threat


Denial of Service (DoS) to company website (not accessible), or to computer software / hardware (power failure) / Temporary loss of data or services that may or may not be restored (Smith, 2016).


Yes


Risk can be countered for website transactions by implementing an alternative method of accepting payments (in-store); or for computer hardware/software by installing an uninterruptable power supply (UPS) to allow systems to function without power.


Identity Theft / Threat to customers regarding identity theft, fraud, theft of funds, etc. and threat to organization storing the data regarding lawsuits, exposure to loss, etc.


Yes


Yes


Risk can be countered by encrypting data, educating consumers to keep account numbers secure, and identifying any vulnerability in the system where data can be accessed.


Disclosure / Threat of confidential company data being exposed to others who are not authorized to view it.


Yes


This type of threat can be countered by implementing complex passwords on laptops and desktops to protect company data exposure.


Masquerade / Access to company network via user who pretends to be the real user and sends messages or manipulates electronic data. Risk of Identity theft.


Yes


Yes


Response to counter this type of threat is to implement a layered security structure. Limiting access via Least Privilege Controls would be a good defense.


Physical Damage to Data or Hardware / According to TrustedComputingGroup.org (2017), “Data backup, off-site mirroring, and other data replication techniques may increase the risk of unauthorized access” or loss. (p. 1, Solutions Guide for Data at Rest).


Yes


Yes


Data stored off-site should definitely be encrypted. If possible, using several layers of encryption is a viable solution. Backups are a critical factor in recovering from this type of threat.


Ransomware / Liability would be greater and damages can be extreme, if no backups exist then company will have to pay a ‘ransom’ to get the encryption key to unencrypt their data files and restore them.


Yes


Yes


Yes


The best defense of this type of threat is to have a service such as Datto and a Datto backup continuity device installed so that the entire company’s data is backed up on scheduled intervals. This would alleviate the need to pay cyber criminals a monetary ransom to get the encryption key to unlock a company’s data.


Physical Loss / Stolen/Lost mobile devices containing sensitive company data.


Yes


Yes


Yes


Applications are available to install on mobile devices that allow users to wipe their device remotely. This would help secure stored data at rest on mobile devices.


Subversion / Viruses, Worms, and Botnets can infiltrate company website and download malware through company network/files/database.


Yes


Yes


Yes


Periodic updates to anti-virus software will be a necessity in keeping the system free of potential security breaches.


Table 1. Cyber Threats and Risks for CIA (2017).


References


Smith, R. (2016). Elementary information security (2nd ed.). Jones & Bartlett Learning.


EC-Council Official Curriculum (2016). Certified secure computer user: EC Council courseware. EC-Council.


TrustedComputingGroup.org (2017). Solutions Guide for Data at Rest. Retrieved from https://www.trustedcomputinggroup.org/wp-content/uploads/SSIF_Solutions_Guide_for_Data-at-Rest.pdf


Table 2


CYB/110 Week 1 Assignment


Protecting Data Table


Threat to Data-at-Rest


Confidentiality/Integrity/Availability


Suggestion on Countering the Threat


Unauthorized access to unused data while on Database.


Confidentiality, as unauthorized access to the data will compromise user’s privacy.


The simple suggestion would be to take great steps on who is authorized to access the database and investing extra money to ensure the data is well secured while not being active.


Loss of inactive data from a corrupted HDD.


Availability since the loss of data means it won’t available when it is needed


The suggestion to counter corrupted issues would be to set up at least a RAID 1 configuration to decrease the possibility of Data Loss.


Data-at-Rest becoming unreadable from changing programs or different updates


Availability as incorrect updates or a change of program can compromise availability to said data


Performing Software testing before rolling out new software updates or converting to a new program to ensure the older data is still accessible with new software.


Insufficient amount of Bandwidth to access the Data-at-Rest when needed


Availability as an insufficient amount of bandwidth and prevent users from access the inactive data when needed.


Perform regular tests to ensure proper network speed. This will guarantee the data will be efficiently accessible if needed instead of worrying about slow load times.


Out of date security which compromises the Data-at-Rest if not properly current in security standards.


Confidentiality since out of date security standards can compromise the privacy of the confidential Data-at-Rest.


While updating the more used software, the company must also consider the data that is less used but still important. They need to routinely compare the network security of the data-at-rest to the most current security standards.


Table 1. Protecting Data (2017).


Reference Page


Smith, R. (2016). Elementary information security (2nd ed.). Jones & Bartlett Learning.


Table 3


CYB/110 Week 1 Assignment


Protecting Data Table


STUDENT NAME


Protecting Data


Threat to Data-at-Rest


Confidentiality


Affected?


Integrity


Threat


Availability


Threat


Threat Mitigation


Database of Account


Numbers / Threat to customers regarding identify theft, fraud, theft of funds, etc. and threat to organization storing the data in regard to lawsuits, exposure to loss, etc.


Yes


Yes


Yes


Risk can be countered by encrypting data, educating consumers to keep account numbers secure, and identifying any vulnerabilities in the system where data can be accessed.


Employee Database / Threat to company from cyber criminals who can steal this information and commit identity theft using the employee’s information such as social security #’s, address, salary, etc.


Yes


Yes


Yes


Risk can be countered by enacting authentication controls thereby limiting access to this data and strong security to protect data from outside threats.


Customer Database / Similar threat as employee database, only more exposure for companies because liability would be greater and damages can be extreme.


Yes


Yes


Yes


Database encryption seems to be the number one protection for data at rest.


Student Database / Threat of cyber-attack whereas student identifying information could be stolen and/or if threat coming from students themselves, risk of grade changes, etc.


Yes


Yes


Yes


Authentication controls, encryption,


Applied Sciences

Architecture and Design

Biology

Business & Finance

Chemistry

Computer Science

Geography

Geology

Education

Engineering

English

Environmental science

Spanish

Government

History

Human Resource Management

Information Systems

Law

Literature

Mathematics

Nursing

Physics

Political Science

Psychology

Reading

Science

Social Science

Home

Blog

Archive

Contact

google+twitterfacebook

Copyright © 2019 HomeworkMarket.com

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Helping Hand
University Coursework Help
Top Essay Tutor
Writer Writer Name Offer Chat
Helping Hand

ONLINE

Helping Hand

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$160 Chat With Writer
University Coursework Help

ONLINE

University Coursework Help

Hi dear, I am ready to do your homework in a reasonable price.

$162 Chat With Writer
Top Essay Tutor

ONLINE

Top Essay Tutor

I have more than 12 years of experience in managing online classes, exams, and quizzes on different websites like; Connect, McGraw-Hill, and Blackboard. I always provide a guarantee to my clients for their grades.

$165 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Somewhere in outer space god has prepared a place - Chin chin china chip chop chop poem - Bank of baroda power of attorney format - In which sentence are the italicized words a dependent clause - I need 1500 words on Research competitive company websites and social media to see what type of postings are done - I need 3 pages on early childhood practice - Hungry for success scotland - X4 bus timetable portsmouth - Moreton bay council bin order - Piper archer v speeds - Is adam berwid still in jail - 2-hydroxybenzoic acid and ethanoic anhydride - Pros and cons of nist framework - How to use marie - In freud's view an individual experiencing neurotic anxiety feels - 23 kg in litres - Project plan - Compute worley's customer margin for university and memorial - Government and nfp accounting pdf - Vertical translation of a parabola - Jack welch six sigma pdf - D aulaires book of greek myths study guide free - Amazon flex error 13-900 - The hypothesis that an analyst is trying to prove is called the: - How to show composite key in er diagram - A survey found that of pet owners - Patient admission - Tourism in glaciated areas - Mit opencourseware classical mechanics - A job was timed for 60 cycles - The book thief project ideas - Colon hydrotherapy central coast - Natalie reeves teacher mackellar - Mth 221 discrete math for information technology - What college rankings really tell us malcolm gladwell summary - Tvm solver ti nspire - Owl english purdue edu apa - Forensic science teeth - Nightingale apartments san diego - Life orientation grade 8 - Why photography matters jerry l thompson - One example of a primary market transaction would be the - Uncc300 acu unit outline - How to date a browngirl whitegirl or halfie - Lincoln hall university of nottingham - Into the wild chapter 8 - GERD - Search the internet for it governance planning - Configure link local ipv6 address cisco - What is perception in ob - Case Study Analysis - Airbnb 2018 - ACCOUNTING PAPER - Digital Marketing Strategies 2020 and Beyond: https://www.youtube.com/watch?v=bGQG_-OG6fs - Psychological skills training programme football - Evaporating dish scientific drawing - Art quiz for students - Reheapdown - Prosocial behavior - Quadrat method for estimating population size - Urgent - All in the education of general david petraeus pdf - Week 7 Current Event (For Noorfatima) - The obligation to endure prezi - Importance of employee empowerment pdf - Maxwell software inc has the following mutually exclusive projects - AUTISM AND MENTAL HEALTH - Why is historiography important - Similes in i have a dream speech - Briefly summarize the parable of the sower from mark 4 - Accu chek control solution expiration - Introduction to moodle ppt - Intrinsic elements of poetry - Wrestling icon quiz level 81 - Ethics Essay - Obb and bob phase 5 - Student parking permit newcastle - Working with families 7th edition pdf - Geo 3030 - Datamining Disussion:cluster of objects from a binary transaction data set. - Healthcare Informatics Leader's Workflow Analysis for Master's degree program - Write sql server audit events to the security log - Benefits of autocad electrical - C304 task 1 - Maze generator with center room - As the twig is bent so grows the tree meaning - Musical Analysis - Point nepean walking tracks - Nursing Leadership and management DQ # 14 student reply Maydeli Capo - R6 - Unit 9 discussion - WOrLd fAmOUs aStROlogEr+91-9924492424 LoVe vAshikArAn sPEciALisT Baba Ji - Training, New Information System, & Evaluation - Employee personal information form doc - Third party cheque indemnity - Apa referencing guide curtin university - Describe the role of three external services during an emergency - Developmental assessment of young children - Dreaming of werewolf attack - Desiderata for controlled medical vocabularies in the twenty first century - Autotrail apache 634 specification