This website uses cookies to ensure you have the best experience. Learn more

Information Security Threat Mitigation Essay

814 words - 4 pages

Information Security Threats Mitigation

By
Francis Nsofwa Mubanga
Keller Graduate School of Management
Devry University

Professor Sandra Kirkland
SE572
July 14th, 2011 

Table of Contents
Introduction 1
Steps 1
Denial-of-Service attacks (DoS) 1
Distributed Denial-of-Service attacks (DDoS) 1
Masquerading and IP Spoofing attacks 2
Smurf attacks 2
Land .c attacks 2
Man-in-the-Middle attacks 3
Conclusion 3
References 4

Introduction

Our company faces the largest information security threat and we need to take steps to mitigate the risks associated with each one of them.
Steps

Denial-of-Service attacks (DoS)

We will analyze the attack as best as ...view middle of the document...

We can use CluB to collaborate with different routing policies in the network and also use contemporary datagram options (Fu, 2010).
Masquerading and IP Spoofing attacks

We will use the Unicast Reverse Path Forwarding (uRPF) feature a security tool that helps mitigate source IP address spoofing by discarding IP packets that lack a verifiable IP source address in the IP routing table. An uRPF is also a common technique used to mitigate source address spoofing. When we use uRPF, the source address of IP packets is checked to ensure that the route back to the source uses the same interface that the packet arrived on. The input interface might be feasible but if not the path to the source network, the packet will be dropped. There are two types of uRPF implementation namely Strict Mode complying with RFC 2827 filters on Network Ingress Edge and Best Current Practices (BCP 38) and Loose Mode for ISP to ISP Edge, for RTBH filtering (Cisco Systems, 2011).
Smurf attacks

We will need to disable IP-directed broadcast functionality on every router. Generally this functionality will not be missed. The attacker may still be able to launch a Smurf attack from inside our LAN, in which even if we disable IP broadcast functionality at the router their will be no effect. To protect against such an attack, our operating systems must be set to prevent computers from responding to IP-directed broadcast requests.
Land .c attacks

We will need to patch the operating...

Other Essays Like Information Security Threat Mitigation

Blank Stare Essay

1575 words - 7 pages have design an action plan that will continue to get better over time. At USGS we have outlined some guide lines how the raw material is asset over the network. We put it into category High level and low level threat. Threw this process we screen out what information is to be asset by the user qualifications. “Physical, personnel, IT, and operational security controls are to be evaluated at least annually and the appropriate remedial

Term Papers

733 words - 3 pages infrastructure and Confidentiality gains access to your internal network 4. The risks potential, the current protection level and the mitigation steps needed to prepare or reduce the risks/damages. 5. a. Threat vulnerability 1: unauthorized from public internet Information---firewall and encryption. Applications---only from recommended sources (applications with encryption, antivirus

How To Protect Your Network From Cybersecurity

2362 words - 10 pages measures For those with the know-how, it would be possible to "fight back" with programs that can neutralize the threat. This method is used mostly by networks that are under constant attack such as government sites. Business Insider 12 Quick Internet Safety Tips That Will Save Your Digital Life From Getting Hacked * Lisa Eadicicco * * May 28, 2014, 9:50 PM If we've learned anything about cyber security in 2014, it's that hackers

How the Emergency Management Process Works

1303 words - 6 pages and produces reports every day to important leaders. The CIA is responsible for providing national security information and works very closely with the FBI these days. Their main job is to keep top U.S officials aware of key intelligence issues.

Hurricane Mitigation

3509 words - 15 pages The primary effects of hurricanes are that they are one of the most destructive natural hazards, both in terms of frequency and death toll. They pose a major threat to coastal areas, related to the storm surge threat. They are a multiple hazard, since loss of life and property can be a result of one of several factors; Heavy rain, High wind velocity, Storm surge, as a result of the above and low central pressure they also include secondary

Cis 333 Asignment 2

1021 words - 5 pages recommendation that we approach the preceding malicious attacks and threats with a hybrid of risk mitigation and avoidance policies. The following methods and steps would position the company to be successful. Minimizing the security system's vulnerabilities and weaknesses that were determined in a previous assessment is the first step in developing effective security policies and controls. This is the payoff of the proactive strategy. By

Law and Investigation Ethics

5789 words - 24 pages notions of security management and security audit are important. Security audit is usually considered to be useful for verifying that risk mitigation has been implemented and is effective. However, this is a tedious process and often consists of annual (or less frequent) audits of information systems and system infrastructure. In very large enterprises, such audits are often conducted in segments over a period of years. Thus, a particular aspect

Does Natural Disaster Only Harm Humankind?

2008 words - 9 pages disasters, traditional Japanese structures are constructed by wood in order to provide flexibility in the event of tremors. In addition, the government focuses on earthquake and tsunami drill education for every Japanese citizen.   Nowadays in Japan, weak level of earthquakes can no longer threat the citizens, as they are well prepared and become initiative in react to earthquakes. Additionally, according to Madoka, Japanese people have

Ddos Attack

858 words - 4 pages DDoS as a serious threat. No single technology or operational process can provide sufficient protection from a DoS attack. Given the array of attacks covered by DoS/DDoS, it is often not easy to know when an organization is under attack. The best way to defend against a DoS attack is to handle it as a risk-management issue, as opposed to a technical or operational risk. Risk-management should be able to provide adequate coverage of security

Possible Risks of Outsourcing

1560 words - 7 pages small in size. Being damaged also means the data can also be damaged or lost. Also forgetting about your flash drive in a pants pocket and then having them washed is a number reason for flash drives getting damaged. * Security (data) - viruses that can be copied to the flash drive, this happening because there is no internal security which makes the flash drive a high security risk. Risk mitigation strategy If the company is

Communication and Crisis

1117 words - 5 pages risk communication team, communication to the public via the press and via information technology. The first step of communicating a risk situation and all its associated factors is from the agency managing director to subordinates in charge of communication practices and risk mitigation. One component of such communication is the need to assemble a risk communication team (Clawson Freeo, 2012). According to Clawson Freeo (2012), this team

Related Papers

Is4550 Lab 9 Essay

632 words - 3 pages Risk-Threat-Vulnerability IT Security Policy Definition Unauthorized access from Public Internet Acceptable Us Policy User Destroys Data in application and deletes all files Asset Identification and Classification Policy Hacker penetrates you IT infrastructure and gains access to your internal network Vulnerability Assessment and Management Policy Intra-office employee romance gone bad Security Awareness Training Policy Fire

Risk Management Plan Essay

1662 words - 7 pages can be conducted. This requirement involves the use of firewalls and effective without causing undue inconvenience to cardholders or vendors. 2. Cardholder information must be protected wherever it is stored. Repositories with vital data such as dates of birth, mothers' maiden names, Social Security numbers, phone numbers and mailing addresses should be secure against hacking.. 3. Systems should be protected against the activities of malicious

Is 3110 Project Part 1 Essay

1827 words - 8 pages successful exercise of the vulnerability. | Low | the threat source lacks motivation or capability, or controls are in place to prevent, or at least significantly impede, the vulnerability from being exercised. | * Risk mitigation plan * Risk mitigation: The next major step in measuring level of risk was to determine the adverse impact resulting from successful exploitation of vulnerability. The adverse impact of a security event can be described in

Risk Assessment Essay

3724 words - 15 pages objectives. The challenge enterprises face today is in adopting a robust, process-oriented information security risk assessment framework to comply with the control objective. The Operationally Critical Threat, Asset and Vulnerability Evaluation (OCTAVE®) approach is one such framework that enables organisations to understand, assess and address their information security risks from the organisation’s perspective. OCTAVE is not a product, rather it is a