Essay Undergraduate 768 words Human Written

Threat and How Is it

Last reviewed: ~4 min read Technology › Computer Viruses
80% visible
Read full paper →
Paper Overview

¶ … threat and how is it exploited? Provide two (2) examples to support your reasoning. One of the most common security threats is in the form of malicious software such as viruses, worms, Trojan horses ("Top 9 IT security threats of 2009," Net Security, 2009). Although antivirus software can protect users against some of these threats,...

Writing Guide
How to Write a Literature Review with Examples

Writing a literature review is a necessary and important step in academic research. You’ll likely write a lit review for your Master’s Thesis and most definitely for your Doctoral Dissertation. It’s something that lets you show your knowledge of the topic. It’s also a way...

Related Writing Guide

Read full writing guide

Related Writing Guides

Read Full Writing Guide

Full Paper Example 768 words · 80% shown · Sign up to read all

¶ … threat and how is it exploited? Provide two (2) examples to support your reasoning. One of the most common security threats is in the form of malicious software such as viruses, worms, Trojan horses ("Top 9 IT security threats of 2009," Net Security, 2009). Although antivirus software can protect users against some of these threats, no program is perfectly up-to-date, and new threats are being generated all of the time.

Employees may get in the habit of opening up email without thinking of the source, or may be sent email that is 'spoofed' using a name of a familiar client. When employees are allowed to surf online in an unrestricted fashion, a normally friendly site can have malicious adware installed, causing the employees to stumble upon it in their casual surfing and to affect the whole network. A second threat is that of 'phishing' where classified data can be obtained through apparently legitimate questions sent to employees.

Proper training of employees in Internet security safety protocols is essential ("Top 9 IT security threats of 2009," Net Security, 2009). Question 2: Identify a high risk threat and explain the relationship between its impact and likelihood. "A PC is most vulnerable to attacks launched before the software maker has devised and released the necessary fix" (Brandt 2009). Security threats that are left 'unpatched,' or when there is a delay between the creation of the patch and the installment, can leave the system vulnerable to attacks by Malware and viruses.

Of course, it is possible in the case of a protected and enclosed work Intranet, where employees are carefully prepared to monitor their browsing and web-surfing (or there are blocks upon the non-work use of such applications) that the threat will not be exploited. But no company can be assured of this, no matter how well-prepared. Question 3. Are all security concerns vulnerabilities? Explain why or why not and provide two (2) examples to support your reasoning. Not all security concerns are vulnerabilities in the sense that they are system failures.

In the case of 'malicious insiders,' employees with grievances against the company may exploit their knowledge and use this to infiltrate the system. These users have critical data because they are trusted by management. Instead, these employees use their position for nefarious purposes. In this instance, the fault is employee screening on HR's part rather than the system. Physical vulnerabilities, such as users who leave their systems running while still logged in can also create security concerns, even in the case of a secure system.

While systems should have automatic log-outs after a specific period of time, it is impossible for a system to be totally secure if it is being used by an employee who does not follow proper security protocols. Question 4: Identify five (5) important documentation types necessary for the assessment and explain why they are important. Network-based testing tests "components of application vulnerability assessment, host vulnerability assessment, and security best practices" ("Security assessment questionnaire," CMU, 2011).

It is used to "assess the ease with which any outsider could exploit publicly available information or social engineering to gain unauthorized access" from the internet or intranet due to weak encryption, authentication, and other vulnerabilities ("Security assessment questionnaire," CMU, 2011). Host-based assessment evaluates the "the health and security of given workstation or server" ("Security assessment questionnaire," CMU, 2011). It assesses if security controls like anti-virus software are up-to-date and indentifies if unnecessary services are running.

It also assesses how up-to-date and vulnerable security controls may be on a workstation; just like network testing does on a general level. Application assessment assesses the "functionality and resilience of the compiled application to known threats," focusing.

154 words remaining — Conclusions

You're 80% through this paper

The remaining sections cover Conclusions. Subscribe for $1 to unlock the full paper, plus 130,000+ paper examples and the PaperDue AI writing assistant — all included.

$1 full access trial
130,000+ paper examples AI writing assistant included Citation generator Cancel anytime
Sources Used in This Paper
source cited in this paper
7 sources cited in this paper
Sign up to view the full reference list — includes live links and archived copies where available.
Cite This Paper
"Threat And How Is It" (2011, November 01) Retrieved April 22, 2026, from
https://www.paperdue.com/essay/threat-and-how-is-it-47026

Always verify citation format against your institution's current style guide.

80% of this paper shown 154 words remaining