SlideShare a Scribd company logo
1 of 13
9/14/2019 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=37e1cd9d-
c67d-4f63-98c9-
7bb435a8eb0b&course_id=_110940_1&includeDeleted=true&pr
i… 1/4
%38
%3
SafeAssign Originality Report
Fall 2019 - Operations Security (ISOL-631-05) - First Bi-Term •
Week 3 Assignment
%41Total Score: High riskTeja Duvvapu
Submission UUID: b11d40b3-fbc7-60ba-980e-7963e0388fb2
Total Number of Reports
1
Highest Match
41 %
MitigatingAttack.docx
Average Match
41 %
Submitted on
09/14/19
11:44 AM PDT
Average Word Count
734
Highest: MitigatingAttack.docx
%41Attachment 1
Institutional database (3)
Student paper Student paper Student paper
Internet (2)
doczz e-langue
Top sources (3)
Excluded sources (0)
View Originality Report - Old Design
Word Count: 734
MitigatingAttack.docx
1 5 4
2 3
1 Student paper 5 Student paper 4 Student paper
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport?attemptId=37e1cd9d-
c67d-4f63-98c9-
7bb435a8eb0b&course_id=_110940_1&download=true&include
Deleted=true&print=true&force=true
9/14/2019 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=37e1cd9d-
c67d-4f63-98c9-
7bb435a8eb0b&course_id=_110940_1&includeDeleted=true&pr
i… 2/4
Source Matches (15)
Running Head: Mitigating Attack 2
Mitigating Attack 2
Mitigating Ransomware Attack
Teja Duvvapu University of Cumberland 09/14/2019
Ransomware is referring to malicious software which is
intimidating towards blocking access to a machine until there is
some amount paid. It can either come in the form of
file encryption in a network or machine or locking the screen of
the user. Only the computers infected when ransomware attacks
will not be accessed due to encryption of critical
files and a ransom note will be displayed the system affected.
The management has the primary role in risks management by
increasing board in charge of overseeing proper risk
management has been developed in the organization. CISO
should be prepared towards understanding the queries that the
board is making alongside the duty lists to do
alongside the time basis. The board should be oversighting the
cyber risks management towards ensuring that adequate steps
for preventing, detecting as well as correcting risk
occurrence are developed (Pope, 2016, p. 37). Access controls
are crucial for ensuring integrity, confidentiality, as well as the
availability of information. It is a technique used
in preventing or reducing the occurrence of risks within the
organization. The primary type of access controls is logical and
physical. The physical access control is
restricting accessing the company or organization. The logical
access control is limiting access to the data, file systems as well
as network connections of an organization. Both are
identifying, authorizing as well as authenticating within the
organization that is needed for evaluation of login passwords
alongside usernames as well as PINs that are crucial for
layered defense and protecting systems of access controls
(Richardson, & North, 2017, p. 10). Logical Access controls: it
is a technical control which is utilized in managing
access to resources as well as protecting objects with
permissions or requires a user to change his or her credential
with the technical password policy. Access controls can
be categorized into various groups utilized in some mechanisms
of security that are labeled with multiple functions. Preventive
Access Control: working towards preventing
the occurrence of risks. Having a guard is physical preventive
control. This control is considered in physical access control
since it is including alarm system, reviewing
access, lighting, audits, duty separations, CCTVs, locking
systems, smart cards, antivirus software, training awareness for
security as well as security policies (Richardson, & North,
2017, p. 10). Detective Access Control: it is aiming at detecting
or finding irregularities or errors within the system. The control
is performing performance review
towards comparing information regarding current forecasts,
financial as well as prior periods for measuring the extent of
achieving objectives as well as goals towards identifying
conditions that are unusual or unexpected results. These
controls include CCTVs, security guard, audit trails, reviewing
and supervising users, a system for detecting intrusion as
well as incident investigation and honey pots alongside motion
detectors (Pope, 2016, p. 37). Corrective access control: it is for
restoring the system to usual operations after
a disaster occurrence. These are inclusive of antivirus, alarms,
mantraps, security policies, as well as business continuity
planning. A fire extinguisher is categorized under
physical corrective control. Recovery Access Control: it is
providing means of recovering from the disaster occurrence as
well as being able to get the system back to usual
operation before incidence occurrence. These controls are the
site for disaster recovery, data backup systems as well as high
availability (Richardson, & North, 2017, p. 10).
Deterrent access control: the control is trying to discourage the
attackers from attacking the system, for instance, dogs for
security guard, alarms, lights, fences as well as video
surveillance. Compensating access control: used for providing
alternative methods to countermeasures which are having high
implementation cost — for instance, having single
authority serving in one, two or more types of functions such as
detecting, preventing as well as deterring. In conclusion, small
and medium-sized business are mainly prone to
scams, frauds, embezzlement by employees, work crimes as well
as theft. Thus there is a need for implementing precautions for
reducing or preventing dishonesty within the
organization as a result of money and valuable deals of the
business. Big companies mostly value internal controls, unlike
small businesses (Pope, 2016, p. 37).
References
Pope, J. (2016). Ransomware: minimizing the risks. Innovations
in clinical neuroscience, 13(11-12), 37. Richardson, R., &
North, M. M. (2017). Ransomware: Evolution, mitigation, and
prevention. International Management Review, 13(1), 10.
1
2
3 4
2
1
4
1 5
1 1
1
5
1
1
9/14/2019 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=37e1cd9d-
c67d-4f63-98c9-
7bb435a8eb0b&course_id=_110940_1&includeDeleted=true&pr
i… 3/4
Student paper 71%
doczz 66%
e-langue 63%
Student paper 67%
doczz 66%
Student paper 70%
Student paper 100%
Student paper 88%
Student paper 65%
Student paper 100%
Student paper 62%
Student paper 100%
1
Student paper
Ransomware is referring to malicious software which is
intimidating towards blocking access to a machine until
there is some amount paid.
Original source
Ransomware is malicious software that intimidates to
block the access to a machine until some amount is paid
2
Student paper
Access controls are crucial for ensuring integrity,
confidentiality, as well as the availability of information.
Original source
necessary for ensuring confidentiality, availability and
integrity of information
3
Student paper
The primary type of access controls is logical and
physical.
Original source
physical and logical access
4
Student paper
The physical access control is restricting accessing the
company or organization.
Original source
Physical access control limits access to the organization
or company
2
Student paper
Logical Access controls:
Original source
Logical access control
1
Student paper
Access controls can be categorized into various groups
utilized in some mechanisms of security that are labeled
with multiple functions.
Original source
Access controls can be divided into seven categories that
are used for some security mechanisms that can be
labeled with multiple functions
4
Student paper
Preventive Access Control:
Original source
Preventive access control
1
Student paper
Having a guard is physical preventive control.
Original source
A guard is a physical preventive control
5
Student paper
This control is considered in physical access control since
it is including alarm system, reviewing access, lighting,
audits, duty separations, CCTVs, locking systems, smart
cards, antivirus software, training awareness for security
as well as security policies (Richardson, & North, 2017, p.
Original source
This preventative access control will be considered in
physical access control as it includes access review,
audits, lighting, alarm system, separation of duties, locks,
closed circuit television (CCTV), smart cards, callback,
security policies, security awareness training, and
antivirus software
1
Student paper
Detective Access Control:
Original source
Detective Access Control
1
Student paper
The control is performing performance review towards
comparing information regarding current forecasts,
financial as well as prior periods for measuring the extent
of achieving objectives as well as goals towards
identifying conditions that are unusual or unexpected
results.
Original source
It mainly performs a review of performance which
manages to compare the information about current
financial, forecasts, and prior periods to measure the
extent to which goals and objectives are achieved to
identify unexpected results or unusual conditions
1
Student paper
Corrective access control:
Original source
Corrective Access Control
9/14/2019 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=37e1cd9d-
c67d-4f63-98c9-
7bb435a8eb0b&course_id=_110940_1&includeDeleted=true&pr
i… 4/4
Student paper 72%
Student paper 100%
Student paper 90%5
Student paper
These are inclusive of antivirus, alarms, mantraps,
security policies, as well as business continuity planning.
A fire extinguisher is categorized under physical
corrective control.
Original source
The examples of these access control are antivirus
solutions, alarms, mantraps, business continuity
planning, and security policies It is a fire extinguisher is
an example of a physical corrective control
1
Student paper
Recovery Access Control:
Original source
Recovery Access Control
1
Student paper
Deterrent access control: the control is trying to
discourage the attackers from attacking the system, for
instance, dogs for security guard, alarms, lights, fences as
well as video surveillance. Compensating access control:
Original source
Deterrent access control It helps in attempting to
discourage attackers from attacking the machine some of
the examples of Deterrent Access Control are fences,
security guard dogs, lights, video surveillance, and alarms
Compensating Access Control

More Related Content

Similar to 9142019 Originality Reporthttpsucumberlands.blackboar.docx

12022, 929 AM Originality Reporthttpsucumberlands.bl
12022, 929 AM Originality Reporthttpsucumberlands.bl12022, 929 AM Originality Reporthttpsucumberlands.bl
12022, 929 AM Originality Reporthttpsucumberlands.blCicelyBourqueju
 
Ch08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comCh08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comphanleson
 
The state of incident response
The state of incident responseThe state of incident response
The state of incident responseAbhishek Sood
 
Vskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills
 
Cyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the follCyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the follAISHA232980
 
Risk Assessment: Approach to enhance Network Security
Risk Assessment: Approach to enhance Network SecurityRisk Assessment: Approach to enhance Network Security
Risk Assessment: Approach to enhance Network SecurityIJCSIS Research Publications
 
A Guide for Businesses.pdf
A Guide for Businesses.pdfA Guide for Businesses.pdf
A Guide for Businesses.pdfDaviesParker
 
InstructionsAssignment #6Write a 1 to 2 page essay paper th.docx
InstructionsAssignment #6Write a 1 to 2 page essay paper th.docxInstructionsAssignment #6Write a 1 to 2 page essay paper th.docx
InstructionsAssignment #6Write a 1 to 2 page essay paper th.docxLaticiaGrissomzz
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMChristopher Nanchengwa
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentFaheem Ul Hasan
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationApril Dillard
 
SANS 2013 Critical Security Controls Survey Moving From A.docx
SANS 2013 Critical Security Controls Survey Moving From A.docxSANS 2013 Critical Security Controls Survey Moving From A.docx
SANS 2013 Critical Security Controls Survey Moving From A.docxanhlodge
 
Please read the instructions and source that provided, then decide.docx
Please read the instructions and source that provided, then decide.docxPlease read the instructions and source that provided, then decide.docx
Please read the instructions and source that provided, then decide.docxLeilaniPoolsy
 
Information systems and its components ii
Information systems and its components   iiInformation systems and its components   ii
Information systems and its components iiAshish Desai
 
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsMaturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsSirius
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security BackgroundNicholas Davis
 
Information security background
Information security backgroundInformation security background
Information security backgroundNicholas Davis
 
BUSINESS IMPACT ANALYSIS For the project work, we .docx
BUSINESS IMPACT ANALYSIS             For the project work, we .docxBUSINESS IMPACT ANALYSIS             For the project work, we .docx
BUSINESS IMPACT ANALYSIS For the project work, we .docxfelicidaddinwoodie
 
IYeste - Nova - ISEC695 - Final
IYeste - Nova - ISEC695 - FinalIYeste - Nova - ISEC695 - Final
IYeste - Nova - ISEC695 - FinalIvonne Yeste
 

Similar to 9142019 Originality Reporthttpsucumberlands.blackboar.docx (20)

12022, 929 AM Originality Reporthttpsucumberlands.bl
12022, 929 AM Originality Reporthttpsucumberlands.bl12022, 929 AM Originality Reporthttpsucumberlands.bl
12022, 929 AM Originality Reporthttpsucumberlands.bl
 
Security assessment isaca sv presentation jan 2016
Security assessment isaca sv presentation jan 2016Security assessment isaca sv presentation jan 2016
Security assessment isaca sv presentation jan 2016
 
Ch08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comCh08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.com
 
The state of incident response
The state of incident responseThe state of incident response
The state of incident response
 
Vskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample Material
 
Cyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the follCyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the foll
 
Risk Assessment: Approach to enhance Network Security
Risk Assessment: Approach to enhance Network SecurityRisk Assessment: Approach to enhance Network Security
Risk Assessment: Approach to enhance Network Security
 
A Guide for Businesses.pdf
A Guide for Businesses.pdfA Guide for Businesses.pdf
A Guide for Businesses.pdf
 
InstructionsAssignment #6Write a 1 to 2 page essay paper th.docx
InstructionsAssignment #6Write a 1 to 2 page essay paper th.docxInstructionsAssignment #6Write a 1 to 2 page essay paper th.docx
InstructionsAssignment #6Write a 1 to 2 page essay paper th.docx
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every Organization
 
SANS 2013 Critical Security Controls Survey Moving From A.docx
SANS 2013 Critical Security Controls Survey Moving From A.docxSANS 2013 Critical Security Controls Survey Moving From A.docx
SANS 2013 Critical Security Controls Survey Moving From A.docx
 
Please read the instructions and source that provided, then decide.docx
Please read the instructions and source that provided, then decide.docxPlease read the instructions and source that provided, then decide.docx
Please read the instructions and source that provided, then decide.docx
 
Information systems and its components ii
Information systems and its components   iiInformation systems and its components   ii
Information systems and its components ii
 
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsMaturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key Considerations
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
 
Information security background
Information security backgroundInformation security background
Information security background
 
BUSINESS IMPACT ANALYSIS For the project work, we .docx
BUSINESS IMPACT ANALYSIS             For the project work, we .docxBUSINESS IMPACT ANALYSIS             For the project work, we .docx
BUSINESS IMPACT ANALYSIS For the project work, we .docx
 
IYeste - Nova - ISEC695 - Final
IYeste - Nova - ISEC695 - FinalIYeste - Nova - ISEC695 - Final
IYeste - Nova - ISEC695 - Final
 

More from blondellchancy

1. Report contentThe report should demonstrate your understa.docx
1. Report contentThe report should demonstrate your understa.docx1. Report contentThe report should demonstrate your understa.docx
1. Report contentThe report should demonstrate your understa.docxblondellchancy
 
1. Research the assessment process for ELL students in your state. W.docx
1. Research the assessment process for ELL students in your state. W.docx1. Research the assessment process for ELL students in your state. W.docx
1. Research the assessment process for ELL students in your state. W.docxblondellchancy
 
1. Reply:2.Reply:.docx
1. Reply:2.Reply:.docx1. Reply:2.Reply:.docx
1. Reply:2.Reply:.docxblondellchancy
 
1. Review the three articles about Inflation that are of any choice..docx
1. Review the three articles about Inflation that are of any choice..docx1. Review the three articles about Inflation that are of any choice..docx
1. Review the three articles about Inflation that are of any choice..docxblondellchancy
 
1. Read the RiskReport to see what requirements are.2. Read the .docx
1. Read the RiskReport to see what requirements are.2. Read the .docx1. Read the RiskReport to see what requirements are.2. Read the .docx
1. Read the RiskReport to see what requirements are.2. Read the .docxblondellchancy
 
1. Quantitative According to the scoring criteria for the BAI, .docx
1. Quantitative According to the scoring criteria for the BAI, .docx1. Quantitative According to the scoring criteria for the BAI, .docx
1. Quantitative According to the scoring criteria for the BAI, .docxblondellchancy
 
1. Prof. Lennart Van der Zeil’s theorem says that any programmin.docx
1. Prof. Lennart Van der Zeil’s theorem says that any programmin.docx1. Prof. Lennart Van der Zeil’s theorem says that any programmin.docx
1. Prof. Lennart Van der Zeil’s theorem says that any programmin.docxblondellchancy
 
1. Review the results of your assessment using the explanation.docx
1. Review the results of your assessment using the explanation.docx1. Review the results of your assessment using the explanation.docx
1. Review the results of your assessment using the explanation.docxblondellchancy
 
1. Search the internet and learn about the cases of nurses Julie.docx
1. Search the internet and learn about the cases of nurses Julie.docx1. Search the internet and learn about the cases of nurses Julie.docx
1. Search the internet and learn about the cases of nurses Julie.docxblondellchancy
 
1. Qualitative or quantitative paperresearch required(Use stati.docx
1. Qualitative or quantitative paperresearch required(Use stati.docx1. Qualitative or quantitative paperresearch required(Use stati.docx
1. Qualitative or quantitative paperresearch required(Use stati.docxblondellchancy
 
1. Prepare a one page paper on associative analysis. You may researc.docx
1. Prepare a one page paper on associative analysis. You may researc.docx1. Prepare a one page paper on associative analysis. You may researc.docx
1. Prepare a one page paper on associative analysis. You may researc.docxblondellchancy
 
1. Prepare a comparative table in which you contrast the charact.docx
1. Prepare a comparative table in which you contrast the charact.docx1. Prepare a comparative table in which you contrast the charact.docx
1. Prepare a comparative table in which you contrast the charact.docxblondellchancy
 
1. Portfolio part II a) APRN protocol also known as collab.docx
1. Portfolio part II a) APRN protocol also known as collab.docx1. Portfolio part II a) APRN protocol also known as collab.docx
1. Portfolio part II a) APRN protocol also known as collab.docxblondellchancy
 
1. Post the link to one news article, preferably a piece of rece.docx
1. Post the link to one news article, preferably a piece of rece.docx1. Post the link to one news article, preferably a piece of rece.docx
1. Post the link to one news article, preferably a piece of rece.docxblondellchancy
 
1. Please explain fixed and flexible budgeting. Provide an examp.docx
1. Please explain fixed and flexible budgeting. Provide an examp.docx1. Please explain fixed and flexible budgeting. Provide an examp.docx
1. Please explain fixed and flexible budgeting. Provide an examp.docxblondellchancy
 
1. Open and print the Week 6 Assignment.2. The assignment .docx
1. Open and print the Week 6 Assignment.2. The assignment .docx1. Open and print the Week 6 Assignment.2. The assignment .docx
1. Open and print the Week 6 Assignment.2. The assignment .docxblondellchancy
 
1. Plato’s Republic takes as its point of departure the question of .docx
1. Plato’s Republic takes as its point of departure the question of .docx1. Plato’s Republic takes as its point of departure the question of .docx
1. Plato’s Republic takes as its point of departure the question of .docxblondellchancy
 
1. Objective Learn why and how to develop a plan that encompasses a.docx
1. Objective Learn why and how to develop a plan that encompasses a.docx1. Objective Learn why and how to develop a plan that encompasses a.docx
1. Objective Learn why and how to develop a plan that encompasses a.docxblondellchancy
 
1. Open the attached Excel Assignment.xlsx” file and name it LastN.docx
1. Open the attached Excel Assignment.xlsx” file and name it LastN.docx1. Open the attached Excel Assignment.xlsx” file and name it LastN.docx
1. Open the attached Excel Assignment.xlsx” file and name it LastN.docxblondellchancy
 
1. must be a research article from either pubmed or google scholar..docx
1. must be a research article from either pubmed or google scholar..docx1. must be a research article from either pubmed or google scholar..docx
1. must be a research article from either pubmed or google scholar..docxblondellchancy
 

More from blondellchancy (20)

1. Report contentThe report should demonstrate your understa.docx
1. Report contentThe report should demonstrate your understa.docx1. Report contentThe report should demonstrate your understa.docx
1. Report contentThe report should demonstrate your understa.docx
 
1. Research the assessment process for ELL students in your state. W.docx
1. Research the assessment process for ELL students in your state. W.docx1. Research the assessment process for ELL students in your state. W.docx
1. Research the assessment process for ELL students in your state. W.docx
 
1. Reply:2.Reply:.docx
1. Reply:2.Reply:.docx1. Reply:2.Reply:.docx
1. Reply:2.Reply:.docx
 
1. Review the three articles about Inflation that are of any choice..docx
1. Review the three articles about Inflation that are of any choice..docx1. Review the three articles about Inflation that are of any choice..docx
1. Review the three articles about Inflation that are of any choice..docx
 
1. Read the RiskReport to see what requirements are.2. Read the .docx
1. Read the RiskReport to see what requirements are.2. Read the .docx1. Read the RiskReport to see what requirements are.2. Read the .docx
1. Read the RiskReport to see what requirements are.2. Read the .docx
 
1. Quantitative According to the scoring criteria for the BAI, .docx
1. Quantitative According to the scoring criteria for the BAI, .docx1. Quantitative According to the scoring criteria for the BAI, .docx
1. Quantitative According to the scoring criteria for the BAI, .docx
 
1. Prof. Lennart Van der Zeil’s theorem says that any programmin.docx
1. Prof. Lennart Van der Zeil’s theorem says that any programmin.docx1. Prof. Lennart Van der Zeil’s theorem says that any programmin.docx
1. Prof. Lennart Van der Zeil’s theorem says that any programmin.docx
 
1. Review the results of your assessment using the explanation.docx
1. Review the results of your assessment using the explanation.docx1. Review the results of your assessment using the explanation.docx
1. Review the results of your assessment using the explanation.docx
 
1. Search the internet and learn about the cases of nurses Julie.docx
1. Search the internet and learn about the cases of nurses Julie.docx1. Search the internet and learn about the cases of nurses Julie.docx
1. Search the internet and learn about the cases of nurses Julie.docx
 
1. Qualitative or quantitative paperresearch required(Use stati.docx
1. Qualitative or quantitative paperresearch required(Use stati.docx1. Qualitative or quantitative paperresearch required(Use stati.docx
1. Qualitative or quantitative paperresearch required(Use stati.docx
 
1. Prepare a one page paper on associative analysis. You may researc.docx
1. Prepare a one page paper on associative analysis. You may researc.docx1. Prepare a one page paper on associative analysis. You may researc.docx
1. Prepare a one page paper on associative analysis. You may researc.docx
 
1. Prepare a comparative table in which you contrast the charact.docx
1. Prepare a comparative table in which you contrast the charact.docx1. Prepare a comparative table in which you contrast the charact.docx
1. Prepare a comparative table in which you contrast the charact.docx
 
1. Portfolio part II a) APRN protocol also known as collab.docx
1. Portfolio part II a) APRN protocol also known as collab.docx1. Portfolio part II a) APRN protocol also known as collab.docx
1. Portfolio part II a) APRN protocol also known as collab.docx
 
1. Post the link to one news article, preferably a piece of rece.docx
1. Post the link to one news article, preferably a piece of rece.docx1. Post the link to one news article, preferably a piece of rece.docx
1. Post the link to one news article, preferably a piece of rece.docx
 
1. Please explain fixed and flexible budgeting. Provide an examp.docx
1. Please explain fixed and flexible budgeting. Provide an examp.docx1. Please explain fixed and flexible budgeting. Provide an examp.docx
1. Please explain fixed and flexible budgeting. Provide an examp.docx
 
1. Open and print the Week 6 Assignment.2. The assignment .docx
1. Open and print the Week 6 Assignment.2. The assignment .docx1. Open and print the Week 6 Assignment.2. The assignment .docx
1. Open and print the Week 6 Assignment.2. The assignment .docx
 
1. Plato’s Republic takes as its point of departure the question of .docx
1. Plato’s Republic takes as its point of departure the question of .docx1. Plato’s Republic takes as its point of departure the question of .docx
1. Plato’s Republic takes as its point of departure the question of .docx
 
1. Objective Learn why and how to develop a plan that encompasses a.docx
1. Objective Learn why and how to develop a plan that encompasses a.docx1. Objective Learn why and how to develop a plan that encompasses a.docx
1. Objective Learn why and how to develop a plan that encompasses a.docx
 
1. Open the attached Excel Assignment.xlsx” file and name it LastN.docx
1. Open the attached Excel Assignment.xlsx” file and name it LastN.docx1. Open the attached Excel Assignment.xlsx” file and name it LastN.docx
1. Open the attached Excel Assignment.xlsx” file and name it LastN.docx
 
1. must be a research article from either pubmed or google scholar..docx
1. must be a research article from either pubmed or google scholar..docx1. must be a research article from either pubmed or google scholar..docx
1. must be a research article from either pubmed or google scholar..docx
 

Recently uploaded

Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 

Recently uploaded (20)

Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 

9142019 Originality Reporthttpsucumberlands.blackboar.docx

  • 1. 9/14/2019 Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReport/ultra?attemptId=37e1cd9d- c67d-4f63-98c9- 7bb435a8eb0b&course_id=_110940_1&includeDeleted=true&pr i… 1/4 %38 %3 SafeAssign Originality Report Fall 2019 - Operations Security (ISOL-631-05) - First Bi-Term • Week 3 Assignment %41Total Score: High riskTeja Duvvapu Submission UUID: b11d40b3-fbc7-60ba-980e-7963e0388fb2 Total Number of Reports 1 Highest Match 41 % MitigatingAttack.docx Average Match 41 % Submitted on
  • 2. 09/14/19 11:44 AM PDT Average Word Count 734 Highest: MitigatingAttack.docx %41Attachment 1 Institutional database (3) Student paper Student paper Student paper Internet (2) doczz e-langue Top sources (3) Excluded sources (0) View Originality Report - Old Design Word Count: 734 MitigatingAttack.docx 1 5 4 2 3 1 Student paper 5 Student paper 4 Student paper https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReport?attemptId=37e1cd9d- c67d-4f63-98c9-
  • 3. 7bb435a8eb0b&course_id=_110940_1&download=true&include Deleted=true&print=true&force=true 9/14/2019 Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReport/ultra?attemptId=37e1cd9d- c67d-4f63-98c9- 7bb435a8eb0b&course_id=_110940_1&includeDeleted=true&pr i… 2/4 Source Matches (15) Running Head: Mitigating Attack 2 Mitigating Attack 2 Mitigating Ransomware Attack Teja Duvvapu University of Cumberland 09/14/2019 Ransomware is referring to malicious software which is intimidating towards blocking access to a machine until there is some amount paid. It can either come in the form of file encryption in a network or machine or locking the screen of the user. Only the computers infected when ransomware attacks will not be accessed due to encryption of critical files and a ransom note will be displayed the system affected. The management has the primary role in risks management by increasing board in charge of overseeing proper risk management has been developed in the organization. CISO should be prepared towards understanding the queries that the board is making alongside the duty lists to do alongside the time basis. The board should be oversighting the
  • 4. cyber risks management towards ensuring that adequate steps for preventing, detecting as well as correcting risk occurrence are developed (Pope, 2016, p. 37). Access controls are crucial for ensuring integrity, confidentiality, as well as the availability of information. It is a technique used in preventing or reducing the occurrence of risks within the organization. The primary type of access controls is logical and physical. The physical access control is restricting accessing the company or organization. The logical access control is limiting access to the data, file systems as well as network connections of an organization. Both are identifying, authorizing as well as authenticating within the organization that is needed for evaluation of login passwords alongside usernames as well as PINs that are crucial for layered defense and protecting systems of access controls (Richardson, & North, 2017, p. 10). Logical Access controls: it is a technical control which is utilized in managing access to resources as well as protecting objects with permissions or requires a user to change his or her credential with the technical password policy. Access controls can be categorized into various groups utilized in some mechanisms of security that are labeled with multiple functions. Preventive Access Control: working towards preventing the occurrence of risks. Having a guard is physical preventive control. This control is considered in physical access control since it is including alarm system, reviewing access, lighting, audits, duty separations, CCTVs, locking systems, smart cards, antivirus software, training awareness for security as well as security policies (Richardson, & North, 2017, p. 10). Detective Access Control: it is aiming at detecting
  • 5. or finding irregularities or errors within the system. The control is performing performance review towards comparing information regarding current forecasts, financial as well as prior periods for measuring the extent of achieving objectives as well as goals towards identifying conditions that are unusual or unexpected results. These controls include CCTVs, security guard, audit trails, reviewing and supervising users, a system for detecting intrusion as well as incident investigation and honey pots alongside motion detectors (Pope, 2016, p. 37). Corrective access control: it is for restoring the system to usual operations after a disaster occurrence. These are inclusive of antivirus, alarms, mantraps, security policies, as well as business continuity planning. A fire extinguisher is categorized under physical corrective control. Recovery Access Control: it is providing means of recovering from the disaster occurrence as well as being able to get the system back to usual operation before incidence occurrence. These controls are the site for disaster recovery, data backup systems as well as high availability (Richardson, & North, 2017, p. 10). Deterrent access control: the control is trying to discourage the attackers from attacking the system, for instance, dogs for security guard, alarms, lights, fences as well as video surveillance. Compensating access control: used for providing alternative methods to countermeasures which are having high implementation cost — for instance, having single authority serving in one, two or more types of functions such as detecting, preventing as well as deterring. In conclusion, small and medium-sized business are mainly prone to scams, frauds, embezzlement by employees, work crimes as well as theft. Thus there is a need for implementing precautions for
  • 6. reducing or preventing dishonesty within the organization as a result of money and valuable deals of the business. Big companies mostly value internal controls, unlike small businesses (Pope, 2016, p. 37). References Pope, J. (2016). Ransomware: minimizing the risks. Innovations in clinical neuroscience, 13(11-12), 37. Richardson, R., & North, M. M. (2017). Ransomware: Evolution, mitigation, and prevention. International Management Review, 13(1), 10. 1 2 3 4 2 1 4 1 5 1 1 1 5 1 1
  • 7. 9/14/2019 Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReport/ultra?attemptId=37e1cd9d- c67d-4f63-98c9- 7bb435a8eb0b&course_id=_110940_1&includeDeleted=true&pr i… 3/4 Student paper 71% doczz 66% e-langue 63% Student paper 67% doczz 66% Student paper 70% Student paper 100% Student paper 88% Student paper 65% Student paper 100% Student paper 62% Student paper 100% 1
  • 8. Student paper Ransomware is referring to malicious software which is intimidating towards blocking access to a machine until there is some amount paid. Original source Ransomware is malicious software that intimidates to block the access to a machine until some amount is paid 2 Student paper Access controls are crucial for ensuring integrity, confidentiality, as well as the availability of information. Original source necessary for ensuring confidentiality, availability and integrity of information 3 Student paper The primary type of access controls is logical and physical. Original source physical and logical access 4
  • 9. Student paper The physical access control is restricting accessing the company or organization. Original source Physical access control limits access to the organization or company 2 Student paper Logical Access controls: Original source Logical access control 1 Student paper Access controls can be categorized into various groups utilized in some mechanisms of security that are labeled with multiple functions. Original source Access controls can be divided into seven categories that are used for some security mechanisms that can be labeled with multiple functions 4
  • 10. Student paper Preventive Access Control: Original source Preventive access control 1 Student paper Having a guard is physical preventive control. Original source A guard is a physical preventive control 5 Student paper This control is considered in physical access control since it is including alarm system, reviewing access, lighting, audits, duty separations, CCTVs, locking systems, smart cards, antivirus software, training awareness for security as well as security policies (Richardson, & North, 2017, p. Original source This preventative access control will be considered in physical access control as it includes access review, audits, lighting, alarm system, separation of duties, locks, closed circuit television (CCTV), smart cards, callback, security policies, security awareness training, and antivirus software
  • 11. 1 Student paper Detective Access Control: Original source Detective Access Control 1 Student paper The control is performing performance review towards comparing information regarding current forecasts, financial as well as prior periods for measuring the extent of achieving objectives as well as goals towards identifying conditions that are unusual or unexpected results. Original source It mainly performs a review of performance which manages to compare the information about current financial, forecasts, and prior periods to measure the extent to which goals and objectives are achieved to identify unexpected results or unusual conditions 1 Student paper Corrective access control:
  • 12. Original source Corrective Access Control 9/14/2019 Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReport/ultra?attemptId=37e1cd9d- c67d-4f63-98c9- 7bb435a8eb0b&course_id=_110940_1&includeDeleted=true&pr i… 4/4 Student paper 72% Student paper 100% Student paper 90%5 Student paper These are inclusive of antivirus, alarms, mantraps, security policies, as well as business continuity planning. A fire extinguisher is categorized under physical corrective control. Original source The examples of these access control are antivirus solutions, alarms, mantraps, business continuity planning, and security policies It is a fire extinguisher is an example of a physical corrective control 1
  • 13. Student paper Recovery Access Control: Original source Recovery Access Control 1 Student paper Deterrent access control: the control is trying to discourage the attackers from attacking the system, for instance, dogs for security guard, alarms, lights, fences as well as video surveillance. Compensating access control: Original source Deterrent access control It helps in attempting to discourage attackers from attacking the machine some of the examples of Deterrent Access Control are fences, security guard dogs, lights, video surveillance, and alarms Compensating Access Control