Please Help This Question Q1 Qualitative Risk Assessment (CISSP guide to securit
ID: 3907631 • Letter: P
Question
Please Help This Question
Q1 Qualitative Risk Assessment (CISSP guide to security essentials Casse Project 1-1)
As a consultant with the Risk Analysis Consulting Co., you have been asked to perform a qualitative risk assessment for the TRC Chemical Company. TRC Chemical has a large outside sales force, numbering in the hundreds. Most of these employees use their own home computers (70% laptops, 30% desktops) to conduct TRC Chemical business. You have been asked to assess the risks associated with the use of home computers versus company owned and -managed computers.
Explanation / Answer
Q1) assess the risks associated with the use of home computers
Computer Viruses - Perhaps the most well-known computer security threat, a computer virus is a program written to alter the way a computer operates, without the permission or knowledge of the user. A virus replicates and executes itself, usually doing damage to your computer in the process. Carefully evaluating free software, downloads from peer-to-peer file sharing sites, and emails from unknown senders are crucial to avoiding viruses. Most web browsers today have security settings which can be ramped up for optimum defense against online threats. But, as we'll say again and again in this post, the single most-effective way of fending off viruses is up-to-date antivirus software from a reputable provider.
Spyware Threats - A serious computer security threat, spyware is any program that monitors your online activities or installs programs without your consent for profit or to capture personal information. We’ve amassed a wealth of knowledge that will help you combat spyware threats and stay safe online. While many users won't want to hear it, reading terms and conditions is a good way to build an understanding of how your activity is tracked online.
Hackers and Predators - People, not computers, create computer security threats and malware. Hackers and predators are programmers who victimize others for their own gain by breaking into computer systems to steal, change, or destroy information as a form of cyber-terrorism. These online predators can compromise credit card information, lock you out of your data, and steal your identity.
Phishing - Masquerading as a trustworthy person or business, phishers attempt to steal sensitive financial or personal information through fraudulent email or instant messages. Phishing attacks are some of the most successful methods for cybercriminals looking to pull off a data breach. Antivirus solutions with identity theft protection can be "taught" to recognize phishing threats in fractions of a second.
Q2) assess the risks associated with the use of company owned and -managed computers.
Distributed denial-of-service (DDoS) attack - A distributed denial-of-service (DDoS) attack — or DDoS attack — is when a malicious user gets a network of zombie computers to sabotage a specific website or server. The attack happens when the malicious user tells all the zombie computers to contact a specific website or server over and over again. That increase in the volume of traffic overloads the website or server causing it to be slow for legitimate users, sometimes to the point that the website or server shuts down completely.
Ransomware - Ransomware is a type of malware that restricts access to your computer or your files and displays a message that demands payment in order for the restriction to be removed. The two most common means of infection appear to be phishing emails that contain malicious attachments and website pop-up advertisements.
Spam - Spam is one of the more common methods of both sending information out and collecting it from unsuspecting people.
4. Spoofing - This technique is often used in conjunction with phishing in an attempt to steal your information. A website or email address that is created to look like it comes from a legitimate source. An email address may even include your own name, or the name of someone you know, making it difficult to discern whether or not the sender is real
Please let me know in case of any clarifications required. Thanks!