Verified Document

Threat And How Is It Essay

Physical vulnerabilities, such as users who leave their systems running while still logged in can also create security concerns, even in the case of a secure system. While systems should have automatic log-outs after a specific period of time, it is impossible for a system to be totally secure if it is being used by an employee who does not follow proper security protocols. Question 4: Identify five (5) important documentation types necessary for the assessment and explain why they are important.

Network-based testing tests "components of application vulnerability assessment, host vulnerability assessment, and security best practices" ("Security assessment questionnaire," CMU, 2011). It is used to "assess the ease with which any outsider could exploit publicly available information or social engineering to gain unauthorized access" from the internet or intranet due to weak encryption, authentication, and other vulnerabilities ("Security assessment questionnaire," CMU, 2011).

Host-based assessment evaluates the "the health and security of given workstation or server" ("Security assessment questionnaire," CMU, 2011). It assesses if security controls like anti-virus software are up-to-date and indentifies if unnecessary services are running. It also assesses how up-to-date and vulnerable security controls may be on a workstation; just like network testing does on a general level. Application assessment...

Compliance assessment audits systems for compliance with federal regulations such as HIPAA, FERPA, GLBA, and PCI. Physical security assessment interviews staff to ensure that they are knowledgeable in correct procedures (such as logging out when stepping away from a computer) and determines if all systems are physically secure and safe from human and environmental threats ("Security assessment questionnaire," CMU, 2011).
Works Cited

Brandt, Andrew. "How to stop operating system attacks." 2009. PC World. [1 Nov 2011]

http://www.pcworld.com/article/157821/how_to_stop_operatingsystem_attacks.html

"Security assessment questionnaire." Carnegie Mellon University. [1 Nov 2011]

Retrieved November 1, 2011 at http://www.cmu.edu/iso/service/sec-assess/Assessment%20Questionnaire.doc

"Top 9 IT security threats of 2009." Net Security. 2009. [1 Nov 2011]

http://www.net-security.org/secworld.php?id=6845

Sources used in this document:
Works Cited

Brandt, Andrew. "How to stop operating system attacks." 2009. PC World. [1 Nov 2011]

http://www.pcworld.com/article/157821/how_to_stop_operatingsystem_attacks.html

"Security assessment questionnaire." Carnegie Mellon University. [1 Nov 2011]

Retrieved November 1, 2011 at http://www.cmu.edu/iso/service/sec-assess/Assessment%20Questionnaire.doc
http://www.net-security.org/secworld.php?id=6845
Cite this Document:
Copy Bibliography Citation

Related Documents

Threat Assessment the Objective of
Words: 2120 Length: 5 Document Type: Essay

" (Vossekuil, Borum, Fein, and Reddy, 2008) Stated to be an example of inductive assessment strategy is that of profiling. Profiling involves a description of the 'typical perpetrator' being compiled through use of characteristics that previous perpetrators of that specific type of crime have met. This profile is then used as a template or prototype for comparison of individuals who are believed or suspected to be a potential perpetrator. In contrast,

Threat and Vulnerability Assessment in
Words: 620 Length: 2 Document Type: Essay

Since access to the site is significantly restricted, the probability of external threat not highly likely. However, the fact that only two guards are stationed at the access gate, leaving the rest of the surrounding perimeter somewhat vulnerable, could provide more access to the site than is desirable. The building itself is, however protected by alarm systems, which contributes to a lower level of vulnerability. The vulnerability level is

Threat Analysis for Al-Qaeda Is
Words: 2838 Length: 8 Document Type: Thesis

Tactics and Strategies Used by Al-Qaeda Al-Qaeda has come to rely on the suicide attack as its major terror tactic, which is not only terrifyingly effective but also most difficult to prevent. The reason for the success of the strategy is simple: any targeted killing has traditionally been difficult to carry out due to a basic human instinct of self-preservation and any terrorist used to prefer to escape unharmed while carrying

Threat Assessment
Words: 1450 Length: 5 Document Type: Term Paper

Threat Assessment South America's very old, biggest, most competent, and well- equipped rebellion having Marxist origin is the Revolutionary Armed Forces of Colombia - FARC. The uproar and clashing in the 1950s involving liberal and conservative militias lead to the civil war that demolished Columbia and from here FARC came into existence. The murder of liberal party leader Jorge Eliecer by the representatives of the conservative government ignited the battle between

Threat of Bioterrorism There Are Many Reasons
Words: 1692 Length: 5 Document Type: Research Paper

Threat of Bioterrorism There are many reasons to believe that overruling of the possibility of bioterrorism in the country is a serious mistake. In fact, it is practically impossible to ignore the fact that in the recent past, there has been an escalation in the cases of bioterrorist attacks. However, this has not always been the case and many people were in denial of the possibility of anyone using such measures

Threat to Dollar As the
Words: 793 Length: 2 Document Type: Term Paper

The willingness of the foreign central banks to continue lending money to the U.S. has enabled Americans to sustain their consumer economy and to live beyond their means. The profligate nature of the American consumers is reflected in the personal savings rate in the U.S. (about 1% of disposable income) as compared to over 40% in China. (Gundzik, Para on "Consumption vs. investment") However, indefinite support of the rising U.S.

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now