Make it in simple language

1 answer below »
Answered Same DaySep 19, 2020

Answer To: Make it in simple language

Kuldeep answered on Sep 20 2020
133 Votes
IS Security
IS Security and Risk Management
Student Name
University Name
Contents
Introduction    2
Ransomware malware threads against organization Information systems.    2
B. Three tools to tackle the ransomware attack    2
Threats against network routers and switches    2
How routers and switches are vulnerable to destruction and abuse    2
How the organization can ensure the reliability and availability of the web service    2
The ways to ensure confidentiality and integrity of the staff email    2
Discussion and prioritize the threats and the possible types of malware    2
Proposal of two approache
s to improve the availability of email servers    3
Impact of human factors and organizational issues on IS-related security    3
Illustration the use of logs records    3
Use of audit log reports for performing auditing analysis    3
Proposal of five network security devices to control security and mitigate threats related to the web and email servers    3
Conclusions and Recommendations    3
References    4
Introduction
Information technology is the basis for business today. In several industries, the existence and existence of not being widely used in IT are unparalleled as well as IT plays an important role in improving productivity. IT has become a commodity when supplementary changes are gathered in the organization as well as management; they can support new products, services, and practices of business and provide strategic benefits for the business. I am an intern at ABC PVT. LTD. Company, this is an information system service for employees and customers. ABC is responsible for its data processing and information systems or systems.
Ransomware malware threads against organization Information systems.
A. The working mechanism of ransomware
Ransomware can access the computers in various ways. One of the most common distribution systems, phishing spam - is an attachment sent by email to affiliates, who pretend to believe in the beliefs. After downloading and opening, they can take the victim's computer; especially they have social engineering tools that encourage users to administer access.
B. Three tools to tackle the ransomware attack
Trend Micro Lock Screen Ransomware Tool: Trend Micro Tools "Lock Screen" is designed to identify and remove ransomware victims, a malware that prevents users from accessing on their PCs or systems, and persistently strive to pay for data such as all ransomware users. Trend Micro lists two situations in which its tools are effective. First, when employees PC's are on normal mode is blocked, its "safe mode" is still accessible, and then when the lock screen ransomware blocks "normal mode" and "safe mode". In the first case, the user needs to install the software using the keyboard sequence by booting the PC to safe mode to bypass the malware. Then the screen should appear, provide scan and cleanup options, and then reboot.
In the second case where Safe Mode is not accessible, Trend Micro allows an uninfected computer to load its removal tool onto a USB drive and execute from there during boot (Bosse, Splieth and Turowski, 2016).
Avast anti-ransomware tools: Avast provides installation and decryption wizards. It will then ask organizations for two documents, one for encryption and one for comparison and password determination. This is much faster if the company have a backup, but if not, Avast will suggest a location on their system for uninfected files.
BitDefender Anti-ransomware: BitDefender's tools are designed to prevent infection by CTB-Locker, Locky, Petya and TeslaCrypt ransomware. The splash screen is clean and tidy, with sections that prevent executables from running from certain locations, and the option to turn on the guard. The company emphasizes that the program is not intended as an alternative to anti-virus, but should be used with it (Cao, 2014).
Threats against network routers and switches
How routers and switches are vulnerable to destruction and abuse
ABC organization knows that software is hard to write and software experts make mistakes or even make mistakes. Often these errors look a bit, blurry, or diagonally. But this mistake often gives hackers enough room to take advantage of the system to create a clever hack and allow them to do things that are not authorized to do. Router vendors are the tools and they can design ways to reduce the cost of most of their source cost hardware to get huge profits. Although this software is run by the show, often a piece of pinch is ignored. The software is usually developed as a method of thinking and is not attracted to it. In fact, most firmware in the router is based on popular software. However, older versions of this software are often used. This means that if a hacker knows that the software has a known vulnerability, then the router is at risk (Fenz et al., 2014).
If a malicious hacker can break into a switch, such as a phishing attack on the same network, then the hacker can steal data, manipulate data, or just research industrial processes to understand how to destroy data at a later stage. Cassidy, an IO Active security consultant tells the motherboard. For example, in a substation, a hacker can change current and can damage a transformer or small device. In a chemical plant, a hacker might prevent an alarm from sounding when something goes wrong, or let the controller think it's a problem and prompt them to shut down the facility when everything is fine.
How the organization can ensure the reliability and availability of the web
service
Web service reliability and availability is a simple, open model to ensure reliable messaging for web services. Define trusted messaging as the ability to deliver messages to software applications (Web services or Web service client applications) with select quality services (QoS) levels. Examples of web service include support services for three main categories: Communication Protocol, Service Description and Service Search. In order to address the security...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here