Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Create a 1-page table in Microsoft® Word or Excel® listing a minimum of five thr

ID: 3912500 • Letter: C

Question

Create a 1-page table in Microsoft® Word or Excel® listing a minimum of five threats using the column headers Threat to Data-at-Rest, Confidentiality/Integrity/Availability, and Suggestion on Countering the Threat. In the Confidentiality/Integrity/Availability column, identify whether each of the following are affected: Confidentiality Integrity Availability Some or all of the three (Confidentiality, Integrity, and/or Availability) Include suggestions on how to counter each threat listed. Place your list in the 3 columns of a table in a Microsoft® Word or Excel® document.

Explanation / Answer

1) Information Segmentation- Not keeping all your eggs in one basket i.e. dividing information into various segments.

2) More levels of granularity to system permissions. Ex- system administrator overseeing the human resources' benefits application cannot access customers' credit card information

1) Higher Encryption.

2) Anti-Malware and hiring trained professionals to handle such situations.

1) Timely Updates.

2) Proper Replacement of old software.

1) Proper Monitoring.

2) Proper training to company officials.

1) Proper team of trained individuals for configuration.

2) Timely monitoring of their working.

Threat to Data-at-Rest Confidentiality/Integrity/Availability Suggestion on Countering the Threat Bad Design Confidentiality and Integrity

1) Information Segmentation- Not keeping all your eggs in one basket i.e. dividing information into various segments.

2) More levels of granularity to system permissions. Ex- system administrator overseeing the human resources' benefits application cannot access customers' credit card information

Malware All

1) Higher Encryption.

2) Anti-Malware and hiring trained professionals to handle such situations.

Outdated Software Availability

1) Timely Updates.

2) Proper Replacement of old software.

Social Engineering Confidentiality and Integrity

1) Proper Monitoring.

2) Proper training to company officials.

Lack of Proper Configuration All

1) Proper team of trained individuals for configuration.

2) Timely monitoring of their working.