You are on page 1of 10

Risk and Solutions

Types of Security Risks


• Computer Virus
• Malware
• Lack of Recovery Plan
• Data Breach
Computer Virus
Types of Computer Viruses
• Frequent pop-up windows
• Mass emails being sent from your account
• Unknown programs running on compute
• Unusual activity on computer or accounts

Viruses can cause damage to a system by corrupting sensitive data, deleting files,
or formatting drives.
Malware
Types of Malware
• Worms
• Spyware
• Trojans
• Ransomware

Malware requires the user to preform a action to spread, this can be via email,
executable files, or instant messaging. Malware is a way for people to steal
sensitive data or put out ransoms for data.
Lack of recovery plan
Affects of a lack of recovery plan
• Complete data loss
• Business interruption
• Loss of clients
• Expensive recovery
Security risks and there potential impact on
an Organisation
• Loss of data
• Damage to Hardware
• Outages
• Loss of money
• Damage to reputation
• Online Reputation
• Lawsuit
• Breaking of Laws
Improving Network Security
DMZ (Demilitarized Zone)
Subnetwork to provide extra layer of security. Monitored section of network to
send untrusted network connections.
The DMZ usually hosts email, web servers and DNS servers
Static IP
A static IP requires more setup before users can join a network and
tends to be more secure than Dynamic IP’s.
IP’s can be given to all devices on a network wired and wireless.
Improving Network Security
Incorrect Configuration of Third Party VPN’s
VPN’s for business can be used to all allow remote access to the network, or for
to connect multiple sites so they can access the same resources.
• Security Risks
• Increase Latency
• Outages
Incorrect Configuration of Firewall’s
Firewall are used to monitor all incoming an out going network traffic.
Firewalls can Drop, Reject and Allow data.
Assessing Security Risks
A Security Risk Assessment Covers:
 Identifying Assets
 Creating Risk Profiles
 Finding out what data is created, stored or transmitted
 Assessing the impact if a threat does happen
 Implementing migrating controls for each risk
Network Monitoring Systems
Network Monitoring us used to track all devices and data being sent
through the network.
Benefits of Network Monitoring
1. Effectively allocating resources
2. Managing a changing IT environment
3. Deploying new technology and system upgrades successfully

You might also like