Вы находитесь на странице: 1из 3

Running head: [SHORTENED TITLE UP TO 50 CHARACTERS] 1

Threats to Confidentiality, Integrity, and Availability

Darin Tate

Cyber 110 – Foundation of Security

Instructor: Mark Stewart


[SHORTENED TITLE UP TO 50 CHARACTERS] 2

Threat: Computer Virus

Threat to Type of Data: Data-In-Transit, Data-At-Rest

Confidentiality/Integrity/Availability: Integrity

Mitigation: Keeping your virus scan software updated and running all the time. Use spam filters and

virus scans on emails. Be careful on clicking on suspicious ads on websites. When new security

patches for office programs and operating systems are available to install then update them

immediately.

Threat: Rogue security software

Threat to Type of Data: Data-In-Transit, Data-At-Rest

Confidentiality/Integrity/Availability: Confidentiality, Integrity, Availability

Mitigation: Be cautious with emails and links, websites that you are not familiar with, pop-up window

which can look like well known programs. Only open files what were sent by trusted third parties.

Keep all of your virus and security programs updated with the latest versions.

Threat: Computer Worm

Threat to Type of Data: Data-In-Transit, Data-At-Rest

Confidentiality/Integrity/Availability: Integrity, Availability

Mitigation: Keep all your virus and security programs updated with the latest versions. Be wary of

opening attachments on emails from people you do not know. Do not install or run programs from

third parties that are unknown.

Threat: DOS and DDOS attack

Threat to Type of Data: Data-In-Transit, Processing

Confidentiality/Integrity/Availability: Confidentiality, Integrity, Availability

Mitigation: Monitor network traffic. Request help from your Internet Service Provider to see if they

can form a extra line of protection, outsource to a company who can help combat DDoS attacks.
[SHORTENED TITLE UP TO 50 CHARACTERS] 3

Threat: Phishing

Threat to Type of Data: Data-At-Rest

Confidentiality/Integrity/Availability: Confidentiality

Mitigation: Institute strong password policies. Train your employees what phishing attempts can

look like. Have anti-phishing software installed that will identify potential phishing emails. Call a client

to verify if they really sent the email before opening if it looks suspicious.

Threat: Trojan Horse Virus

Threat to Type of Data: Data-At-Rest, Data-In-Transit, Processing

Confidentiality/Integrity/Availability: Confidentiality, Integrity, Availability

Mitigation: Keep your antivirus activated and running as often as possible. Do not open links or

attachments from unknown emails. Always use firewalls to keep your personal information protected.

References:

 Rosencrance, L. (2019). Top 10 types of information security threats for IT teams. Retrieved

from https://searchsecurity.techtarget.com/feature/Top-10-types-of-information-security-

threats-for-IT-teams

 Top 10 Common Network Security Threats Explained(2018). Retrieved from

https://securitytrails.com/blog/top-10-common-network-security-threats-explained

Вам также может понравиться