SlideShare a Scribd company logo
1 of 15
Running head: THREATS, ATTACKS AND VULNERABILITY
ASSESSMENT
THREATS, ATTACKS AND VULNERABILITY ASSESSMENT
8
Threats, Attacks and Vulnerability Assessment
Anthony bahlman
CMGT/400
03/30/2019
Google LLC is a technological company from America
which specializes in Internet-related products and services.
Some of the products and services which are offered by Google
include search engines, cloud computing, hardware, software,
and online advertising technologies. It is considered among the
Big Four companies which also include Apple, Amazon, and
Facebook. The organization was founded by Larry Page and
Sergey Brin in 1998. The founders were Ph.D. students at
Stanford University in California. All facilities are subject to a
certain level of risk which can be associated with different
threats. The threats may be as a result of natural events,
intentional acts by human beings to cause harm or accidents
(Maglaras et al., 2018). The owners of companies have the
responsibility of limiting or managing the risks arising from the
threats to the maximum extent possible.
Tangible Assets
Google is one of the best technology companies in the world
with a high number of tangible assets within its premises,
especially in the headquarters located in Mountain View,
California. The information systems, critical infrastructure, and
cyber-related interests to be tested include the software of the
company, hardware, system interfaces with consideration of
internal and external connectivity, data and information, and
people who use and support IT system. The aspects will be
assessed because they are crucial to the day to day operations of
the facility, and a breach in any aspect may lead to major
disruption of services. The aspects which will not be assessed
include IT system functional requirements, system users,
current network topology system security policies which guide
the use of the IT system and the architecture of security of the
system. The aspects will not be assessed because of the minimal
threat they pose to the system, and low probability of risk to
arise from them. Moreover, the disruption of the items does not
lead to significant interference in the operation of the
organization.
Asset Descriptions
The following is a diagram of the flow of assessment activities:
The assets descriptions are outlined below:
· Hardware- Physical parts of the computers.
· IT personnel- Individuals operating computer systems.
Threat Agents and Possible Attacks
There are several threat agents and possible attacks that may
face the organization. the company may be subject to floods
which may be as a result of excessive rainfall or overflowing
ocean water. Tornadoes are also a possible threat to the
organization, and these are violent and destructive rotating
winds. Other possible natural threats to the organization
headquarters include earthquakes, electrical storms, and
avalanches. Electrical storms involve the violent disturbance of
the electrical condition of the atmosphere, and such an
occurrence can destroy any electrical system. The company also
faces the human threat of hacking where people may make
attempts to gain unauthorized access to their files. There is also
the threat of unintentional acts of inadvertent data entry taking
place. Another possible threat is the possibility of malicious
software upload by people intending to destroy the reputation of
the company (Esteves, Ramalho & De Haro, 2017). There is
also the treatment of employees of the organization gaining
access to confidential information using their credentials. The
other possible threat of environmental nature to the organization
is a long term power failure, and this may lead adversely affect
them because of the use of technological systems highly
dependent on power. Pollution may also affect the environment
in which the workers perform their duties. The company also
faces the threat of industrial espionage by the competitors.
Finally, the spillage of dangerous liquids or chemicals from
factories can affect the working environment.
Exploitable Vulnerabilities
The following is the list of exploitable vulnerabilities:
· Failure of removal of identifiers of terminated employees
· Buffer overflows
· The firewall of the company allows for inbound tenet, and the
identification of guest is allowed on XYZ server
· The failure of application of new patches to one of the systems
with an identified flaw
· The server room uses sprinklers for fire protection but there is
no hardware to protect from water damage.
· The possibility of code injection in the system.
· Presence of dangling pointers
Existing Countermeasures
The organization has several existing countermeasures to threats
and vulnerabilities. The data and crucial information files are
backed up in an offsite location. The backup schedule is also
accurate to ensure they do not miss out on any information.
There are also arrangements for another location in the event
that the primary site is rendered to be inoperable. There are also
several procedures which protect against the unauthorized
access or use of the computer systems. System monitoring is
done on a regular basis for detection of any unusual aspects.
The company also has a risk analysis plan and security strategy
developed from the risk analysis.
Evaluation of Threats or Impacts on the Business
Threat History Events
Duration
Business Impact
Threat Resolution
Hacking
1 day
None
Change of hardware at customer sites
Hacking
Hours
None
Software upgrades.
Prioritized List of Identified Risks
Risk
Probability
Priority
Owner
Countermeasures/Contingencies/Mitigation Approach
Hacking
High
High
IT personnel
Regular software and hardware updates.
Use of two-factor authentications.
Long term power failure
Low
High
Emergency department
Establishment of power back up systems
Natural events such as flooding and earthquakes
Medium
Medium
Emergency Department
Establishment of evacuation protocols for personnel and data
back up systems in offsite location
Malicious software uploads
Low
Medium
IT personnel
System restoration protocols.
References
Maglaras, L. A., Kim, K. H., Janicke, H., Ferrag, M. A., Rallis,
S., Fragkou, P., ... & Cruz, T. J. (2018). Cybersecurity of
critical infrastructures. ICT Express, 4(1), 42-45.
Esteves, J., Ramalho, E., & De Haro, G. (2017). To improve
cybersecurity, think like a hacker. MIT Sloan Management
Review, 58(3), 71.
Topic is The increases number in hacking and potential counter-
measures.
So far The progress is good but there is a lot of room for
improvement and expansion. The literature review section is a
small section followed by a new section called "Trends of
increase and growth in hacking". I think it is better to make
literature review a major section which includes the rest
following sections as subsections.
- Make sure your conclusion section be expanded.
More so, You should discuss all deliverable items proposed in
your case study proposal and explain the findings
According to the proposal,below is the deliverable items
Research deliverables are
? Understanding computer vulnerabilities
? Computer vulnerability and user negligence
? Saving of confidential information in a computer system
? Protecting a computer network from possible threat
Research questions are follows
What are computer vulnerabilities and how are they exploited?
1. Why computer vulnerabilities can be associated with
negligence of the users?
2. How is confidential information used or saved by
organizations?
3. What measures are taken by organization to safeguard their
respective computer system from being vulnerable? etc, more
can be added
.
CMGT/400 v7
Penetration Testing Plan Template
CMGT/400 v7
Page 5 of 5Penetration Testing Plan Template
Instructions: Replace the information in brackets [ ] with
information relevant to your penetration testing project. Fill out
each of the sections below with information relevant to your
project.
A Penetration Tester evaluates the security of an information
infrastructure by intentionally, and safely, exploiting
vulnerabilities. Take on the role of Penetration Tester for the
approved organization you chose in Week 1. Research the
following information about the organization you chose. Use
this template to create a Penetration Testing Plan.[Organization
Name]
Criteria
Response
Project Title:
[Response]
Project Sponsor(s):
[Response]
Business Context for the Penetration Test:
[Response]
Project Scope Description:
[Response]
Date Prepared:
[Response]
Prepared By:
[Response]
Penetration Testing Scope Statement
Penetration Test Pre-Planning
Team Location(s)
Organization Location(s)
Client Personnel Aware of Testing
Resources Provided to Pentest Team
Pentest Technologies Used
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
High-Level Work Schedule: Project Scope
Description of Work/Pentest Boundaries
Assumptions and Constraints
What is tested? Social engineering test boundaries? What is
acceptable? What are the boundaries of physical security tests?
What are the restriction on invasive pentest attacks? What type
of corporate policy affect your test?
[Response]
[Response]
Milestones
Due Dates
[Response]
[Response]
ID
Activity
Resource
Labor
Material
Total Cost
Hours
Rate
Total
Units
Cost
Total
Appropriate Authorization (Including Third-Party
Authorization)
Name
Title/Organization
Description of Authorization and Consent (Identify reference
documents)
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
Reconnaissance Deliverable Name
Reconnaissance Deliverable Description
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
Reconnaissance Pentest Activities
Scanning Pentest Activities
Scanning Test Deliverable Name
Scanning Test Deliverable Description
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
Gaining Access Activities
Gaining Access Activity Name
Gaining Access Activity Description
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
Maintaining Access Activities
Maintaining Access Activity Name
Maintaining access Activity Description
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
Covering Tracks Activities
Covering Tracks Activity Name
Covering Tracks Activity Description
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
[Response]
Pentest Analysis and Report Planning
Describe plan for analyzing and reporting pentest results.
[Response]
Copyright© 2018 by University of Phoenix. All rights reserved.
Copyright© 2018 by University of Phoenix. All rights reserved.
Running head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docx

More Related Content

Similar to Running head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docx

IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A SurveyIRJET Journal
 
Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance EnergyTech2015
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxchristiandean12115
 
Cyber security white paper final PMD 12_28_16
Cyber security white paper final PMD 12_28_16Cyber security white paper final PMD 12_28_16
Cyber security white paper final PMD 12_28_16Dave Darnell
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMChristopher Nanchengwa
 
An Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationAn Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationIJERA Editor
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docxtoltonkendal
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4Rodrigo Piovesana
 
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET Journal
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141sraina2
 
Case Cyber Security.docx
Case Cyber Security.docxCase Cyber Security.docx
Case Cyber Security.docxbkbk37
 
Case Cyber Security.docx
Case Cyber Security.docxCase Cyber Security.docx
Case Cyber Security.docxstudywriters
 
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docxRunning Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docxjeanettehully
 
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docxRunning Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docxtodd521
 
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...IRJET Journal
 

Similar to Running head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docx (20)

IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
 
Cyber security white paper final PMD 12_28_16
Cyber security white paper final PMD 12_28_16Cyber security white paper final PMD 12_28_16
Cyber security white paper final PMD 12_28_16
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
 
An Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationAn Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an Organization
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docx
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 
Case Cyber Security.docx
Case Cyber Security.docxCase Cyber Security.docx
Case Cyber Security.docx
 
Case Cyber Security.docx
Case Cyber Security.docxCase Cyber Security.docx
Case Cyber Security.docx
 
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docxRunning Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
 
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docxRunning Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
 
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
 
Database Security Analysis
Database Security AnalysisDatabase Security Analysis
Database Security Analysis
 
E04 05 2841
E04 05 2841E04 05 2841
E04 05 2841
 
digital marketing
digital marketingdigital marketing
digital marketing
 

More from todd521

Running head SHORT TITLE OF PAPER (= 50 CHARACTERS)TitleAu.docx
Running head SHORT TITLE OF PAPER (= 50 CHARACTERS)TitleAu.docxRunning head SHORT TITLE OF PAPER (= 50 CHARACTERS)TitleAu.docx
Running head SHORT TITLE OF PAPER (= 50 CHARACTERS)TitleAu.docxtodd521
 
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS) .docx
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS)    .docxRunning head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS)    .docx
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS) .docxtodd521
 
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS) .docx
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS)        .docxRunning head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS)        .docx
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS) .docxtodd521
 
Running head SEMESTER PAPER .docx
Running head SEMESTER PAPER                                  .docxRunning head SEMESTER PAPER                                  .docx
Running head SEMESTER PAPER .docxtodd521
 
Running Head Sherry’s Personal Leadership Plan1Sherry’s P.docx
Running Head Sherry’s Personal Leadership Plan1Sherry’s P.docxRunning Head Sherry’s Personal Leadership Plan1Sherry’s P.docx
Running Head Sherry’s Personal Leadership Plan1Sherry’s P.docxtodd521
 
Running Head SHARING CLINICAL DATASHARING CLINICAL DATA.docx
Running Head SHARING CLINICAL DATASHARING CLINICAL DATA.docxRunning Head SHARING CLINICAL DATASHARING CLINICAL DATA.docx
Running Head SHARING CLINICAL DATASHARING CLINICAL DATA.docxtodd521
 
Running head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docx
Running head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docxRunning head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docx
Running head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docxtodd521
 
Running Head Sexuality education in schoolsSexuality .docx
Running Head Sexuality education in schoolsSexuality .docxRunning Head Sexuality education in schoolsSexuality .docx
Running Head Sexuality education in schoolsSexuality .docxtodd521
 
Running Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docx
Running Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docxRunning Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docx
Running Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docxtodd521
 
Running head SETTING UP RESEARCH1 Chapter 6 Methods of Measu.docx
Running head SETTING UP RESEARCH1  Chapter 6 Methods of Measu.docxRunning head SETTING UP RESEARCH1  Chapter 6 Methods of Measu.docx
Running head SETTING UP RESEARCH1 Chapter 6 Methods of Measu.docxtodd521
 
Running head SEx as a protected class 1SEx as a protected clas.docx
Running head SEx as a protected class 1SEx as a protected clas.docxRunning head SEx as a protected class 1SEx as a protected clas.docx
Running head SEx as a protected class 1SEx as a protected clas.docxtodd521
 
Running head SETTING UP COMPANY 1SETTING UP .docx
Running head SETTING UP COMPANY                 1SETTING UP .docxRunning head SETTING UP COMPANY                 1SETTING UP .docx
Running head SETTING UP COMPANY 1SETTING UP .docxtodd521
 
Running head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docx
Running head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docxRunning head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docx
Running head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docxtodd521
 
Running Head SETTING A BUDGET1SETTING A BUDGET 6.docx
Running Head SETTING A BUDGET1SETTING A BUDGET 6.docxRunning Head SETTING A BUDGET1SETTING A BUDGET 6.docx
Running Head SETTING A BUDGET1SETTING A BUDGET 6.docxtodd521
 
Running Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docx
Running Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docxRunning Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docx
Running Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docxtodd521
 
Running Head Security Technologies IdentifiedProject .docx
Running Head Security Technologies IdentifiedProject .docxRunning Head Security Technologies IdentifiedProject .docx
Running Head Security Technologies IdentifiedProject .docxtodd521
 
Running head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docx
Running head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docxRunning head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docx
Running head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docxtodd521
 
Running head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docx
Running head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docxRunning head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docx
Running head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docxtodd521
 
Running Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docxRunning Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docxtodd521
 
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docx
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docxRunning head SECURITY MECHANISM1SECURITY MECHANISM 2.docx
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docxtodd521
 

More from todd521 (20)

Running head SHORT TITLE OF PAPER (= 50 CHARACTERS)TitleAu.docx
Running head SHORT TITLE OF PAPER (= 50 CHARACTERS)TitleAu.docxRunning head SHORT TITLE OF PAPER (= 50 CHARACTERS)TitleAu.docx
Running head SHORT TITLE OF PAPER (= 50 CHARACTERS)TitleAu.docx
 
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS) .docx
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS)    .docxRunning head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS)    .docx
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS) .docx
 
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS) .docx
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS)        .docxRunning head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS)        .docx
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS) .docx
 
Running head SEMESTER PAPER .docx
Running head SEMESTER PAPER                                  .docxRunning head SEMESTER PAPER                                  .docx
Running head SEMESTER PAPER .docx
 
Running Head Sherry’s Personal Leadership Plan1Sherry’s P.docx
Running Head Sherry’s Personal Leadership Plan1Sherry’s P.docxRunning Head Sherry’s Personal Leadership Plan1Sherry’s P.docx
Running Head Sherry’s Personal Leadership Plan1Sherry’s P.docx
 
Running Head SHARING CLINICAL DATASHARING CLINICAL DATA.docx
Running Head SHARING CLINICAL DATASHARING CLINICAL DATA.docxRunning Head SHARING CLINICAL DATASHARING CLINICAL DATA.docx
Running Head SHARING CLINICAL DATASHARING CLINICAL DATA.docx
 
Running head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docx
Running head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docxRunning head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docx
Running head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docx
 
Running Head Sexuality education in schoolsSexuality .docx
Running Head Sexuality education in schoolsSexuality .docxRunning Head Sexuality education in schoolsSexuality .docx
Running Head Sexuality education in schoolsSexuality .docx
 
Running Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docx
Running Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docxRunning Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docx
Running Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docx
 
Running head SETTING UP RESEARCH1 Chapter 6 Methods of Measu.docx
Running head SETTING UP RESEARCH1  Chapter 6 Methods of Measu.docxRunning head SETTING UP RESEARCH1  Chapter 6 Methods of Measu.docx
Running head SETTING UP RESEARCH1 Chapter 6 Methods of Measu.docx
 
Running head SEx as a protected class 1SEx as a protected clas.docx
Running head SEx as a protected class 1SEx as a protected clas.docxRunning head SEx as a protected class 1SEx as a protected clas.docx
Running head SEx as a protected class 1SEx as a protected clas.docx
 
Running head SETTING UP COMPANY 1SETTING UP .docx
Running head SETTING UP COMPANY                 1SETTING UP .docxRunning head SETTING UP COMPANY                 1SETTING UP .docx
Running head SETTING UP COMPANY 1SETTING UP .docx
 
Running head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docx
Running head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docxRunning head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docx
Running head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docx
 
Running Head SETTING A BUDGET1SETTING A BUDGET 6.docx
Running Head SETTING A BUDGET1SETTING A BUDGET 6.docxRunning Head SETTING A BUDGET1SETTING A BUDGET 6.docx
Running Head SETTING A BUDGET1SETTING A BUDGET 6.docx
 
Running Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docx
Running Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docxRunning Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docx
Running Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docx
 
Running Head Security Technologies IdentifiedProject .docx
Running Head Security Technologies IdentifiedProject .docxRunning Head Security Technologies IdentifiedProject .docx
Running Head Security Technologies IdentifiedProject .docx
 
Running head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docx
Running head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docxRunning head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docx
Running head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docx
 
Running head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docx
Running head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docxRunning head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docx
Running head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docx
 
Running Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docxRunning Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docx
 
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docx
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docxRunning head SECURITY MECHANISM1SECURITY MECHANISM 2.docx
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docx
 

Recently uploaded

Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Recently uploaded (20)

Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 

Running head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docx

  • 1. Running head: THREATS, ATTACKS AND VULNERABILITY ASSESSMENT THREATS, ATTACKS AND VULNERABILITY ASSESSMENT 8 Threats, Attacks and Vulnerability Assessment Anthony bahlman CMGT/400 03/30/2019 Google LLC is a technological company from America which specializes in Internet-related products and services. Some of the products and services which are offered by Google include search engines, cloud computing, hardware, software, and online advertising technologies. It is considered among the
  • 2. Big Four companies which also include Apple, Amazon, and Facebook. The organization was founded by Larry Page and Sergey Brin in 1998. The founders were Ph.D. students at Stanford University in California. All facilities are subject to a certain level of risk which can be associated with different threats. The threats may be as a result of natural events, intentional acts by human beings to cause harm or accidents (Maglaras et al., 2018). The owners of companies have the responsibility of limiting or managing the risks arising from the threats to the maximum extent possible. Tangible Assets Google is one of the best technology companies in the world with a high number of tangible assets within its premises, especially in the headquarters located in Mountain View, California. The information systems, critical infrastructure, and cyber-related interests to be tested include the software of the company, hardware, system interfaces with consideration of internal and external connectivity, data and information, and people who use and support IT system. The aspects will be assessed because they are crucial to the day to day operations of the facility, and a breach in any aspect may lead to major disruption of services. The aspects which will not be assessed include IT system functional requirements, system users, current network topology system security policies which guide the use of the IT system and the architecture of security of the system. The aspects will not be assessed because of the minimal threat they pose to the system, and low probability of risk to arise from them. Moreover, the disruption of the items does not lead to significant interference in the operation of the organization. Asset Descriptions The following is a diagram of the flow of assessment activities: The assets descriptions are outlined below: · Hardware- Physical parts of the computers.
  • 3. · IT personnel- Individuals operating computer systems. Threat Agents and Possible Attacks There are several threat agents and possible attacks that may face the organization. the company may be subject to floods which may be as a result of excessive rainfall or overflowing ocean water. Tornadoes are also a possible threat to the organization, and these are violent and destructive rotating winds. Other possible natural threats to the organization headquarters include earthquakes, electrical storms, and avalanches. Electrical storms involve the violent disturbance of the electrical condition of the atmosphere, and such an occurrence can destroy any electrical system. The company also faces the human threat of hacking where people may make attempts to gain unauthorized access to their files. There is also the threat of unintentional acts of inadvertent data entry taking place. Another possible threat is the possibility of malicious software upload by people intending to destroy the reputation of the company (Esteves, Ramalho & De Haro, 2017). There is also the treatment of employees of the organization gaining access to confidential information using their credentials. The other possible threat of environmental nature to the organization is a long term power failure, and this may lead adversely affect them because of the use of technological systems highly dependent on power. Pollution may also affect the environment in which the workers perform their duties. The company also faces the threat of industrial espionage by the competitors. Finally, the spillage of dangerous liquids or chemicals from factories can affect the working environment. Exploitable Vulnerabilities The following is the list of exploitable vulnerabilities: · Failure of removal of identifiers of terminated employees · Buffer overflows · The firewall of the company allows for inbound tenet, and the
  • 4. identification of guest is allowed on XYZ server · The failure of application of new patches to one of the systems with an identified flaw · The server room uses sprinklers for fire protection but there is no hardware to protect from water damage. · The possibility of code injection in the system. · Presence of dangling pointers Existing Countermeasures The organization has several existing countermeasures to threats and vulnerabilities. The data and crucial information files are backed up in an offsite location. The backup schedule is also accurate to ensure they do not miss out on any information. There are also arrangements for another location in the event that the primary site is rendered to be inoperable. There are also several procedures which protect against the unauthorized access or use of the computer systems. System monitoring is done on a regular basis for detection of any unusual aspects. The company also has a risk analysis plan and security strategy developed from the risk analysis. Evaluation of Threats or Impacts on the Business Threat History Events Duration Business Impact Threat Resolution Hacking 1 day None Change of hardware at customer sites Hacking Hours None Software upgrades. Prioritized List of Identified Risks Risk Probability
  • 5. Priority Owner Countermeasures/Contingencies/Mitigation Approach Hacking High High IT personnel Regular software and hardware updates. Use of two-factor authentications. Long term power failure Low High Emergency department Establishment of power back up systems Natural events such as flooding and earthquakes Medium Medium Emergency Department Establishment of evacuation protocols for personnel and data back up systems in offsite location Malicious software uploads Low Medium IT personnel System restoration protocols.
  • 6. References Maglaras, L. A., Kim, K. H., Janicke, H., Ferrag, M. A., Rallis, S., Fragkou, P., ... & Cruz, T. J. (2018). Cybersecurity of critical infrastructures. ICT Express, 4(1), 42-45. Esteves, J., Ramalho, E., & De Haro, G. (2017). To improve cybersecurity, think like a hacker. MIT Sloan Management Review, 58(3), 71. Topic is The increases number in hacking and potential counter- measures. So far The progress is good but there is a lot of room for improvement and expansion. The literature review section is a small section followed by a new section called "Trends of increase and growth in hacking". I think it is better to make literature review a major section which includes the rest following sections as subsections. - Make sure your conclusion section be expanded. More so, You should discuss all deliverable items proposed in your case study proposal and explain the findings According to the proposal,below is the deliverable items
  • 7. Research deliverables are ? Understanding computer vulnerabilities ? Computer vulnerability and user negligence ? Saving of confidential information in a computer system ? Protecting a computer network from possible threat Research questions are follows What are computer vulnerabilities and how are they exploited? 1. Why computer vulnerabilities can be associated with negligence of the users? 2. How is confidential information used or saved by organizations? 3. What measures are taken by organization to safeguard their respective computer system from being vulnerable? etc, more can be added . CMGT/400 v7 Penetration Testing Plan Template CMGT/400 v7 Page 5 of 5Penetration Testing Plan Template Instructions: Replace the information in brackets [ ] with
  • 8. information relevant to your penetration testing project. Fill out each of the sections below with information relevant to your project. A Penetration Tester evaluates the security of an information infrastructure by intentionally, and safely, exploiting vulnerabilities. Take on the role of Penetration Tester for the approved organization you chose in Week 1. Research the following information about the organization you chose. Use this template to create a Penetration Testing Plan.[Organization Name] Criteria Response Project Title: [Response] Project Sponsor(s): [Response] Business Context for the Penetration Test: [Response] Project Scope Description: [Response] Date Prepared: [Response] Prepared By: [Response] Penetration Testing Scope Statement Penetration Test Pre-Planning Team Location(s) Organization Location(s) Client Personnel Aware of Testing Resources Provided to Pentest Team Pentest Technologies Used [Response] [Response]
  • 9. [Response] [Response] [Response] [Response] [Response] [Response] [Response] [Response] [Response] [Response] [Response] [Response] [Response] [Response] [Response] [Response] [Response] [Response] High-Level Work Schedule: Project Scope Description of Work/Pentest Boundaries Assumptions and Constraints What is tested? Social engineering test boundaries? What is acceptable? What are the boundaries of physical security tests? What are the restriction on invasive pentest attacks? What type of corporate policy affect your test? [Response] [Response] Milestones Due Dates [Response] [Response]
  • 11. Appropriate Authorization (Including Third-Party Authorization) Name Title/Organization Description of Authorization and Consent (Identify reference documents) [Response] [Response] [Response] [Response] [Response] [Response] [Response]
  • 12. [Response] [Response] [Response] [Response] [Response] [Response] [Response] [Response] [Response] [Response] [Response] Reconnaissance Deliverable Name Reconnaissance Deliverable Description [Response] [Response] [Response] [Response] [Response] [Response] [Response] [Response] [Response] [Response] [Response] [Response] Reconnaissance Pentest Activities Scanning Pentest Activities Scanning Test Deliverable Name Scanning Test Deliverable Description [Response] [Response] [Response]
  • 13. [Response] [Response] [Response] [Response] [Response] [Response] [Response] [Response] [Response] Gaining Access Activities Gaining Access Activity Name Gaining Access Activity Description [Response] [Response] [Response] [Response] [Response] [Response] [Response] [Response] [Response] [Response] [Response] [Response] Maintaining Access Activities Maintaining Access Activity Name Maintaining access Activity Description [Response] [Response] [Response] [Response] [Response]
  • 14. [Response] [Response] [Response] [Response] [Response] [Response] [Response] Covering Tracks Activities Covering Tracks Activity Name Covering Tracks Activity Description [Response] [Response] [Response] [Response] [Response] [Response] [Response] [Response] [Response] [Response] [Response] [Response] Pentest Analysis and Report Planning Describe plan for analyzing and reporting pentest results. [Response] Copyright© 2018 by University of Phoenix. All rights reserved. Copyright© 2018 by University of Phoenix. All rights reserved.