Identifying Potential Risk, Response, and Recovery Essay

703 Words Dec 6th, 2012 3 Pages
Assignment 2: Identifying Potential Risk, Response, and Recovery

Emory Evans August 26, 2012 Dr. Robert Whale CIS 333

There are a myriad of potential threats and vulnerabilities that leave a system open to malicious attack, anytime you have a computer network that connects to the internet there is a potential for malicious attack so it is important that you know the vulnerabilities of a system to protect it from potential threats and malicious attacks.
“A vulnerability is any weakness in a system that makes it possible for a threat to cause harm.” (Kim & Solomon, 2012, p. 96). There are several common vulnerabilities that exist within the seven domains of an IT infrastructure for example
…show more content…
Malicious attacks can come in many forms but generally speaking attacks fall into one of four categories Fabrications which deception is involved to trick users, Interceptions which involve eavesdropping on transmissions and unauthorized redirecting of those transmissions, Interruptions which causes a break in communication and a blockage of data transmission, and Modifications which alters the data in transmissions (Kim & Solomon, 2012). Attacks such as Brute-force attacks, Dictionary threats, Address spoofing, Hijacking, Replay attacks, Man-in-the-middle attacks, Masquerading, Social engineering, Phishing, Phreaking, and Pharming are all examples of attacks that can have damaging effects on a computer network or system (Kim & Solomon, 2012).
Once vulnerabilities have been identified and potential threats and malicious attacks have been identified one can begin to take countermeasures to eliminate or limit the number of vulnerabilities that a computer system has making it harder for potential threats and malicious attacks to damage it. Counter measures such as risk management plans, firewalls, computer monitoring programs, strict access control to computer networks and systems, anti-virus software, user training can aid in the protection your
Open Document