This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Testing

The identification of threats in cybersecurity

This essay is written by:

Louis PHD Verified writer

Finished papers: 5822

4.75

Proficient in:

Psychology, English, Economics, Sociology, Management, and Nursing

You can get writing help to write an essay on these topics
100% plagiarism-free

Hire This Writer

The identification of threats in cybersecurity

Part 1

Question 1

The identification of threats in cybersecurity is more critical as compared to security Maintainance since it helps identify what type of risk is being dealt with in that the cybersecurity specialists will know what category of the danger they are about to encounter and get prepared in advance for how to deal with it most effectively. It also helps the cybersecurity specialist realize the weaknesses in their security architecture and fix it before any attack is made on the company. Identification of threats plays a significant role in deciding what kind of security measures to be taken in case of an attack on the computer network in question.

Question 2

Penetration testing is a replicate cyber-attack on one’s computer network to look for weaknesses that can be exploited by cyber attackers. It is imperative to a business and a computer system since it helps in risk assessment. It Is through assessing risks that one’s computer network may be exposed to in everyday dealings and the impact that the suspected risk can have on the computer network. It either be done individually or through hired specialists who perform penetration testing. It helps curb the company’s chances of losing its data to other companies or individuals through ways that can be controlled. It helps identifies areas in which a computer system can be exploited by intruders easily. For instance, the problem found after penetration testing is weak database protection, the company will enforce better security protocols for the database.

Part 2

Question 1

Users are considered the weakest link in the implementation of policies because as much as the organizations enforce strong passwords, install the latest security and anti-malware software or to implement even the most robust security rules they are all bound to fail due to the failures and errors made by the typical man or user. They can also give out information about the organization’s computer system logins to outsiders who intern take advantage of that information.

Question 2

Remote access is the access of a computer system that is at a workplace or residential area from a farther place. There are various risks associated with remote access in any computer system or network. These risks can lead to severe losses to organizations.it can quickly help an intruder intercept any information that is being accessed from the computer easily. Computers, especially those used at home, are used by many people and are exposed to many unsafe sites that can carry dangerous malwares that contaminate the laptop and give a hacker easy access whenever the network is remotely accessed.

Question 3

I believe a separate policy should be put in place for remote access of computers in an organization. It is because hackers take advantage of these situations and use them to hack. Close monitoring of the activities done by the individual who has remotely accessed the system should be included in the policy to ensure there is no intrusion.

Question 4

USB thumb drives are the easiest and most portable ways to store data and transfer it from one computer to another. Despite those good qualities, they can be very harmful to an organization according to the usage of employees. One of the dangers it possesses to the organization is that employees can copy the organization’s data and sell it to a rival organization. They can also input a thumb drive that is infected with malware, which can lead to ease of exploitation by hackers or loss of organization data. Employees should not be allowed to bring thumb drives to work unless provided there.

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask