Professional Documents
Culture Documents
[By]
Student Name
Institution
Course
Professor
Date
2
A threat has happened recently or has been identified and poses a risk to the program or
the organization as a whole. Additionally, some systems encourage daily threat assessments so
that users can always be ready for anything. A Threat Assessment is an investigation into any
identified threats' veracity and potential impact. Security risk management often conducts a
threat assessment before making measures to mitigate dangers to the business. Identifying and
evaluating potential hazards is the first step in the threat assessment process. The next step is to
assess the issue's critical and devise a strategy to fix the underlying weakness (perhaps by sink
holing or redirecting it) finally, a follow-up evaluation and preventative measures. Predatory
threats, also known as offensive or targeted threats, are the most common subjects of threat
assessments.
It is common for people to reuse weak passwords across multiple accounts. If users
reuse the same passwords and user IDs, hackers will have more access points to exploit.
Usually, brute force assaults occur when a threat actor tries to gain unauthorized access to data
and systems by systematically trying as many users and presumed passwords as feasible. If the
actor is successful, they can acquire access to the design and assume the identity of a legitimate
user, giving them time to steal data, plant backdoors, learn more about the procedure for use in
future assaults, and perform other malicious actions. In the business world, the risk of a
hacking attack on networked resources increases when employees choose easier and weaker
passwords. When an employee's credentials are stolen from other sites, and those credentials
3
have the same password that grants them access to your privileged networks, the hackers can
Broken Authentication
attacker can gain access to a system with the same permissions as the targeted user. When an
attacker has access to enough sensitive information about a user, such as their password, key,
or session token, to impersonate that user, the authentication system has been "broken."
There is a security hole at the function level if there are insufficient permission checks
for handling sensitive requests. A common security flaw lets malevolent users access restricted
resources by elevating their permissions to the function level. When an attacker gains
sending corrupt requests. Obtaining access to APIs is the first step in a function-level
authorization attack that fails (APIs). By posing as a legitimate user or phishing for credentials,
a malicious person acquires access to the program and then scans it for vulnerabilities (Roy et
al., 2018). Examples of these include allowing direct access to resources and allowing the user
interface to display protected information. Intruders can use these flaws to obtain private data
Security Misconfigurations
Failure to specify, implement, and maintain default values for security settings leads to
security misconfigurations. If this happens, the system is likely not set up to meet the security
standards established by the industry (such as the CIS benchmarks, OWASP Top 10, etc.) that
are essential for keeping the system safe and minimizing the risk to the organization. When a
framework of an application, website, desktop, or server, it leaves dangerous open routes for
hackers.
Software bugs
A bug is a design fault in computer software or hardware that hackers could use to gain
unauthorized access (Sadeghi et al., 2021). These security flaws open the door to attacks on
multiple fronts, putting at risk the identities of users and their access privileges, the privacy of
Unpatched software
Unpatched software is one that still has a bug in it that could compromise user data.
When a security flaw has been discovered but not yet patched, it is said to be "unpatched."
Attackers can exploit this vulnerability by executing malicious code (Yeboah-Ofori, 2020).
Adversarial Mindset
5
company's publicly accessible systems can tell hackers a lot about the organization's internal
network and any weaknesses it may have. After breaking into a system, the first thing a hacker
does is set up a permanent link so that they can keep monitoring the system. As a result, a
security team at ACME Company prioritizes preventing hackers from exchanging information
with internal systems. Keeping in constant contact with infected devices is crucial for botnets
and crypto-jacking malware, which use their processing power for DDoS attacks and
plausible foes. ACME will expose security teams to actual scenarios that can happen during an
assault on the corporation, hence enhancing their ability to fend off any attacks from hackers,
regardless of their expertise level. To gain insight, ACME will allow its IT teams to take on the
roles of attackers used by ACME Company in conjunction with a layered attack simulation to
evaluate the resilience of the company's people, networks, applications, and physical security
controls.
6
When it comes to the application of current international law or political norms to state
uses of particular technologies, ACME Company provides clarity on how a wide range of
parties (not just governments) might contribute responsibly to multilateral bodies' efforts in this
weaponry, biotechnology, and space technology are all examples of topics that have their own
dedicated working groups on these platforms, along with issues of international security.
Infrastructure Diagram
Organizational Protection
People
various malicious approaches to find security flaws in the application. This method tests the
vulnerable parts of a system via a controlled mock assault. This evaluation aims to protect
sensitive information from intruders like hackers. When a security hole is found in a system, it
stop attacks like brute force, credential stuffing, and password spraying (MFA). Attackers
would need both compromised credentials and the second-factor device to access an account
protected by multifactor authentication. With MFA in place, it would take an extremely long
time and effort to compromise the account, making it impractical for a large-scale attack.
Process
network access depending on their assigned function in the company. Access permissions for
users on the network are categorized into "roles" in RBAC. Workers have access to only the
data they need to do their jobs properly. Authority, responsibility, and demonstrated skill in the
relevant field all play a role in determining who has access. Additionally, users are only able to
perform specific actions on the system, such as viewing, creating, or modifying files.
ACME Company supplies Encryption of storage media, correspondence, and data is all
possible with the help of data protection solutions. The Encryption, device, email, and data
control features will be included. When data leaves the company's control, it is still encrypted
automatically to prevent unauthorized access or disclosure. The best data loss prevention
solutions enable employees to keep using email for business and collaboration while
Technology
software development. It considers testing an ongoing activity that should be done in tandem
with code creation. In TDD, the developer creates unit tests to guarantee that the code
continues to function as expected. The method is more of a manner of doing things than a set
of tools.
Code scanners are put in place to ensure that all open-source parts of the software
project are examined. This is done by examining the software's code repositories, package
managers, and build tools. It lists all the open-source resources used in a project and their
dependencies (open source bill of materials). It records the necessary metadata, such as the
project's place of origin, license type, and version number. Like many other technologies used
in network administration, a vulnerability scanner can be put to good and bad ends. The system
administrator, programmer, security researcher, penetration tester, or black hat hacker may find
9
this helpful. You can use it to find vulnerabilities in your network and patch them, or you can
Discuss how to balance the implementation of controls between simple fixes and
organizational concerns.
Our research has shown that a management system based on the balanced scorecard
framework is the most effective means of harmonizing security strategy and organizational
framework. ACME Company unit performance will be driven by the framework's tools, which
will be used by managers at all levels of the company, from regional sales managers to group
CEOs. With the help of strategy maps, managers can articulate the chain of events to realize
the unit's value proposition. The scorecard can put that plan into action and track its progress
effectively. Therefore, a balanced scorecard-based system will serve as both a guide and a
common language for collecting and sharing data on the safety of the business.
10
Reference
0874-0882.
Roy, S., Das, A. K., Chatterjee, S., Kumar, N., Chattopadhyay, S., & Rodrigues, J. J. (2018).
Provably secure fine-grained data access control over multiple cloud servers in mobile
Sadeghi, A. R., Rajendran, J., & Kande, R. (2021, June). Organizing The World's Largest