Sign In
Not register? Register Now!
Essay Available:
You are here: HomeTerm PaperIT & Computer Science
Pages:
2 pages/≈550 words
Sources:
3 Sources
Level:
MLA
Subject:
IT & Computer Science
Type:
Term Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 12.96
Topic:

Responding to Threats: Executive Summary IT & Computer Science Paper (Term Paper Sample)

Instructions:

THE TASK WAS TO write an executive summary on Responding to ransomware Threats

source..
Content:

Student’s Name
Professor’s Name
Course
Date
Responding to Threats: Executive Summary
1 How could changes to authorization, authentication, and roles help mitigate and deal with these systems threats?
Ransomware attacks occur of an organization lacks IAM control or the presence of system misconfigurations. The process of access control begins with identity management, which includes authorization, identification, and authentication (Toapanta et al. 639). Authorization represents the process of granting access to systems. It involves the acceptance of the residual risk of allowing the continued use of a system for a specific period. Changes in the authorization, for instance, restricting the number of personnel able to operate the system or reducing the authorized time to operate a system, would minimize the risks associated with continued operations. Limiting the number of system users means that the organization reduces the risk of stolen user credentials that allow attackers to impersonate users while performing the attack. Minimal time spent operating the system means limited vulnerability to the introduction of ransomware, especially in the pre-stage attacks where the attacker conducts reconnaissance and access aggregation.

...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

Need a Custom Essay Written?
First time 15% Discount!