" /> Security Matrix - Essay Writing Pros

Security Matrix

Security Matrix

The Devil’s Canyon Security-related system that will significantly impact the organization and workflow has been identified as five elements, phishing attacks, cookie spoofing, data tampering, denial of service, and remote administration tools. The need to keep an update and control system to mitigate the risk is great, and the security matrix will give a deep insight on the dangers presented as each will be analyzed one by one.

Don't use plagiarized sources. Get Your Custom Essay on
Security Matrix
Just from $13/Page
Order Essay

Phishing attacks are the highest risk in the data architecture that the company uses, for instance, in the simulation, the user gains access to emails, voice recordings, instant messages, voicemail, and messages. Phishing is hackers gaining access to sensitive information through social engineering and other elements. The risk has the highest matrix angle and works extensively through emails, phone calls, and all the aim is to steal valuable information (Basit et al., 2021).

The organization can implement security controls to mitigate phishing. It is true that phishing mainly targets employee mistakes; thus, training and educating employees with mock phishing simulations can be convenient. Implementing phishing protection software can help; deploying web filters can help block malicious content, encrypt all critical organizational information and documents, and use text-only email messages to disable HTML email messages (Basit et al., 2021).

The controls can be used at an acceptable level because of the primary element used to keep data and security at hand. For instance, employee training and education can be done with simulation at different levels to create alertness and assertiveness in data control. System management can block malicious content and make email settings use text only while disabling HTML. Installation of phishing protection software can be done at any organizational level. The easiest way can be using browser extensions (Basit et al., 2021).

The second element is the remote administration tool (RAT) virus. The virus is a threat that enables others to access computer systems and make the changes needed by gaining administrative tools and acting as a back door to the system. The risk is significant as they can be sued to monitor behavior, access confidential information, and activate webcam and video while taking screenshots on the design and deleting data (Wang et al., 2020).

The security controls that can be used to control RAT mainly by implementing antivirus software and keeping it up to date, employee training on opening attachments from untrusted sources and on most cases blocking unused ports, services, and monitoring traffic can be a good way of managing and controlling remote administrative tools (Wang et al., 2020).

The controls mentioned are adequate in that the problem with RAT is that it acts as a legitimate program. Thus, taking incentives to control and manage the data traffic can keep the system safe. Helping employees be able to identify issues can be a very active measure in system management. It’s more about being alert on the design and looking for the best incentive to control incentives and reduce the threat of unused ports. The action needed is that one cannot remove manually as they hide deep down in the system. System software such as anti-spyware is the best outcome in the organization (Wang et al., 2020).

Denial of service attack (DOS) is a type of risk that works by flooding the website’s traffic to the point that the device cannot hold it more, disrupting connection and communication within the organization. The elements make everything stand still like the name itself shows (Adi et al., 2017).

The security control needed to implement is mainly protecting the system long before the attack hits the organization and causes a flood in the system traffic. It is thus a good deal to work with antivirus software at an early stage to control people’s access to the system. Prevention is always said to work best; therefore, keeping the system updated also is an excellent measure to be safe (Adi et al., 2017).

The mitigation measures can be taken long before the system can be attacked and influenced by the organization’s efforts towards sustainability. The IT management team needs to stay within the limit of any suspicious activities within the security control and keep backups on daily activities within the organization, which will make sure in case of any danger within the organization, the only data that can be lost is the one on the incidence of attack (Adi et al., 2017).

Data tampering are mainly plugins that can be attached to the website and primarily Firefox and chrome and can be a threat, mostly when hackers use such a chance to mandate the content to their advantage. The hacking can pose a significant danger to the organization. The need to identify the hack before posing a threat to the organization can be a great deal towards sustainability (Yamada et al., 2019).

The mitigation method for data tampering is mainly through enforcement of data encryption at rest and data in transit to make sure no editing can be done. Data that is at rest such as SSL, TLS, HTTPS, and FTPS. The second method copies on write file systems give an instant snapshot of file servers, and when changes are made, a photo is taken, which can tell if no change was done, and unnecessary images are available. The other methods can be implementing WORM systems mainly on (Write Once Read Many) systems and aspects like File Integrity Monitoring systems (Yamada et al., 2019).

The rationale for the system is to ensure a secure flow of information and the development of sustainable protection against data tempering. Corporate data, once tampered with, can be hard to develop sustainability; hence, taking incentives to control management can be a good approach for safety measures using the given technological methods (Yamada et al., 2019).

The last risk that is still low level is cookie spoofing and it means constructing fake cookies and using them to trick the computer that you had already logged in as a user. The preventive mitigation factor includes using the proper cookie flags and attributes, unique secure sessions, cookies for a single task, and adequate session management. The aim is to control use and implementation while on an online section as cookies work on the website and associated software. It is thus vital to keep the system within the proper security measuring using all the methods available (Korać et al., 2020).

 

 

 

 

 

 

 

 

 

References

Adi, E., Baig, Z., & Hingston, P. (2017). Stealthy Denial of Service (DoS) attack modeling and detection for HTTP/2 services. Journal of Network and Computer Applications91, 1-13.

Basit, A., Zafar, M., Liu, X., Javed, A. R., Jalil, Z., & Kifayat, K. (2021). A comprehensive survey of AI-enabled phishing attacks detection techniques. Telecommunication Systems76(1), 139-154.

Korać, D., Damjanović, B., & Simić, D. (2020, March). Information security in M-learning systems: Challenges and threats of using cookies. In 2020 19th International Symposium INFOTEH-JAHORINA (INFOTEH) (pp. 1-6). IEEE.

Wang, L., He, R., Wang, H., Xia, P., Li, Y., Wu, L., … & Xu, G. (2020). Beyond the virus: The first look at coronavirus-themed mobile malware. arXiv preprint arXiv:2005.14619.

Yamada, K., Hoshino, J., & Kubo, R. (2019). Detection of data tampering attacks using redundant network paths with different delays for networked control systems. Nonlinear Theory and Its Applications, IEICE10(2), 140-156.

Essay Writing Pros
Calculate your paper price
Pages (550 words)
Approximate price: -

Why Work with Us

Top Quality and Well-Researched Papers

Our writers have been trained on how to handle papers placed by our clients. The writer must read and understand before embarking on writing the papers. In case of any issue that needs clarification, writers are encouraged to ask the client or support.

Professional and Experienced Academic Writers

Our team comprises of the best writers and editors. We do thorough vetting during recruitment to make sure that our writers have the knowledge and experience we aspire in the team.

Free Unlimited Revisions

Our aim is to give the client the best outcome. If for some reason you are not satisfied with the wok done, you can ask the paper to be revised or rewritten. This will be done to your satisfaction with no extra charges.

Prompt Delivery and 100% Money-Back-Guarantee

We have writers who work round the clock. This helps in making sure that all our clients’ papers are delivered on time. If we have issues with the deadline, we will ask for extension. If its not possible, the money is fully refunded.

Original & Confidential

Our clients’ confidentiality is highly respected. We can never disclose our clients’ details to third parties. In the same regard, we strive to give our clients 100% original papers. We do not tolerate plagiarism from our writers.

24/7 Customer Support

Clients can reach us any time of the day, and any day of the week. There is a live chat, email or phone numbers to help in ease of communication.

Try it now!

Calculate the price of your order

Total price:
$0.00

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

You should never be worried about your papers even in the middle of the night. Our team will work round the clock to deliver.

Essays

Essay Writing Service

We have an able team that can deliver your work in the shortest time possible. The academic level or the type of work should never be a hindrance. Our highly competent support team is always around (24/7) to give you any assistance you may need.

Admissions

Admission Essays & Business Writing Help

Do you need to be admitted in your dream institution but find it challenging to write an admission essay? Our team is in a position to write the best letter that will guarantee you an admission. We do as well write the best business proposals and reports.

Reviews

Editing Support

Writing can be fun and enjoyable when everything has been done right. Writing is not just enough without proper editing and proofreading. We have a team of editors that ensure everything falls in place, whether its issues to do with grammar or referencing styles.

Reviews

Revision Support

Once the paper has been done and submitted, that is not the end of it. You can always ask for amendment or improvement if you feel something has not been done right. Our team of writers and editors will gladly assist you to your satisfaction. Revision is free of charge.