Академический Документы
Профессиональный Документы
Культура Документы
Darin Tate
Confidentiality/Integrity/Availability: Integrity
Mitigation: Keeping your virus scan software updated and running all the time. Use spam filters and
virus scans on emails. Be careful on clicking on suspicious ads on websites. When new security
patches for office programs and operating systems are available to install then update them
immediately.
Mitigation: Be cautious with emails and links, websites that you are not familiar with, pop-up window
which can look like well known programs. Only open files what were sent by trusted third parties.
Keep all of your virus and security programs updated with the latest versions.
Mitigation: Keep all your virus and security programs updated with the latest versions. Be wary of
opening attachments on emails from people you do not know. Do not install or run programs from
Mitigation: Monitor network traffic. Request help from your Internet Service Provider to see if they
can form a extra line of protection, outsource to a company who can help combat DDoS attacks.
[SHORTENED TITLE UP TO 50 CHARACTERS] 3
Threat: Phishing
Confidentiality/Integrity/Availability: Confidentiality
Mitigation: Institute strong password policies. Train your employees what phishing attempts can
look like. Have anti-phishing software installed that will identify potential phishing emails. Call a client
to verify if they really sent the email before opening if it looks suspicious.
Mitigation: Keep your antivirus activated and running as often as possible. Do not open links or
attachments from unknown emails. Always use firewalls to keep your personal information protected.
References:
from https://searchsecurity.techtarget.com/feature/Top-10-types-of-information-security-
threats-for-IT-teams
https://securitytrails.com/blog/top-10-common-network-security-threats-explained