COMP1431 Audit and Security Assignment

Assignment Help Computer Engineering
Reference no: EM132555329

COMP1431 Audit and Security - University of Greenwich

Learning Outcomes: Analyse and assess risk exposures of particular assets to particular threatsSpecification

Read the following and then write a report for your client.

MI5, Britain's domestic intelligence agency, has repeated its warning that foreign agents are trying to persuade company insiders to reveal secrets. IT staff with sysadmin access are considered popular targets because of their privileged access rights to many corporate systems.
Security company CyberArk points out that the targets are not the people but their access: "Privileged and administrative accounts are the most powerful in any organisation. They provide absolute control over a company's infrastructure. Attackers use techniques like malware and phishing to steal these privileged and administrative credentials.From Stuxnet to Snowden, the common denominator is that the breach occurred through an exploited privileged account. Attackers understand this - it's time for businesses to understand as well and proactively address these critical security gaps."

Another company, Vormetric, adds: "This warning confirms our contention that the abuse of privileged credentials is the next frontier for cyber crime against enterprises. With organisations such as Target, Morrisons and Korea Credit Bureau falling victim in quick succession, it is clear businesses are still struggling to defend their most critical assets from those legitimately within the perimeter.Vormetric recently surveyed 500 IT decision makers and found almost half believed insider threats had become harder to detect. Just nine per cent said they felt safe from insider threats. Vormetric advises companies to adopt an inside-out security architecture based on strict need-to-know principles. "Businesses must ensure constant monitoring of their IT to detect and respond to data breaches as soon as they happen - irrespective of whether the attack was internal or external."

A furthercompany, LogRhythm, did a study that revealed almost half of UK employees admitted having accessed or taken confidential information from the workplace, while 79 per cent claimed their illegitimate actions had never been identified. "LogRhythm stated "This indicates a gross level of negligence by companies who really should know better."

Part 1: Introduction
What is this report all about, why has it been produced?

Part 2 : PAM Accounts
What exactly could be done with stolen ‘privileged and administrativeaccounts'?

Part 3 : Need-to-Know Data Access
What is meant by ‘strict need-to-know principles'? How could this be arranged?

Part 4 : Data Leakage
What measures should be put in place to protect against employees accessing or taking "confidential information from the workplace. "Give five measures.

Part 5 : Repercussions in Public Domain
How might ‘Target, Morrisons and Korea Credit Bureau' have lost out now that this knowledge of their breach of security is in the public domain?

Part 6: Insider Threats Audit
How might auditors help with keeping the ‘insider threats' under control?

Part 7 :References and Appendices
List of references used and appendices included.

Attachment:- Audit and Security.rar

Reference no: EM132555329

Questions Cloud

How did the reading relate to fraud detection and deterrence : Select one of the readings and provide summary.How did the reading relate to fraud detection and deterrence? What did learn and how will apply it going forward?
Juvenile justice system is challenge of mental health : One sustaining issue in the juvenile justice system is the challenge of mental health.
Think about key elements of communication : If your group was attempting to develop a drug that prevented P. aeruginosa from utilizing quorum sensing and virulence factors, where could your drug target?
Is an alternative substantive procedure : Is there an alternative substantive procedure that you could perform that would provide convincing evidence that this balance is collectible? If so, explain.
COMP1431 Audit and Security Assignment : COMP1431 Audit and Security Assignment Help and Solution, University of Greenwich - Assessment Writing Service - Analyse and assess risk exposures
Describe the treatments used to treat the disease : Describe the respiratory disease you selected. Describe the treatments used to treat the disease. Consider holistic and traditional treatments.
What do think man actions to pay off debt quickly : What do you think of this man's actions to pay off debt quickly? Do you think he was being extreme or wise? Would it be hard for you to live in austerity?
Many security experts argue that primary concern : Many security experts argue that their primary concern isn't hardware or software.
Calculate personal debt ratio : Calculate your own personal Debt Ratio. You may use hypothetical numbers if you want to keep your actual information private. State whether you think this ratio

Reviews

Write a Review

Computer Engineering Questions & Answers

  Create a security policy company explaining network security

Sunica Music and Movies is the local multimedia chain with four locations. Each store has been acting independently of one another and has difficulty coordinating customer sales from one store to another based on inventory.

  Create the six tables shown on the diagram

Create the six tables shown on the diagram. Simulate a point of sale (A transaction header is a sale. A transaction item is an item in a sale).

  Write the function using a loop and without a loop

Add a main to each of the two programs to fully test them out and do at least 5 test run for each program.

  Research the wannacry and the petya cyber-attacks

Search the web for news on computer security breaches that occurred during January-August 2018. Research one such reported incident.

  What are the penetration testing techniques

Do a bit of research on penetration testing techniques. Investigate and document the following: Five network penetration testing techniques.

  Data mining and data mining tools

Describe the data mining and explain the several data mining tools available to the business. Explain the data Warehouse and specify the key attributes of the data warehouse.

  How is it that computers have become faster

How is it that computers have become faster

  Define the role of data analytics in addressing the problem

Provide a brief summary that includes the business problem, the type of study, its purpose, and its final conclusion. Discuss the role of data analytics in.

  Create a date class with integer data members for year

Create a Date class with integer data members for year, month, and day. Also include a string data member for the name of the month.

  What are the information security policies

Using a web browser, search for any information security policies used at your academic institution. Compare them to the ones discussed in this chapter.

  Discuss about the reliability characteristic

Study from the literature about the reliability characteristic and its major issues in developing and implementing application for the organization.

  How tree develops when the sequence a a r d v is transmitted

How the tree develops when the sequence a a r d v is transmitted. Continue this example with the next letters in the sequence, ark.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd