Monday, June 17, 2019

Security Risk Analysis for Intrusion Detection and Prevention of Essay

Security Risk Analysis for Intrusion Detection and Pr blushtion of Cybercrime - Essay ExampleData and alert correlation in the soldiers communicate and the future of intrusion detection and prevention methods are touched upon. The paper recommends appropriate procedures to control the threats and reduce the vulnerability of the system to lower the level and bushel them acceptable keeping in mind the military network and the sensitivity of data protection in this case. Top five risks are analyzed and short reviewed. Current federal legislation and the standards based on securing and preventing cybercrime will be analyzed. Steps will be recommended to implement and maintain the strategy proposed. Risk digest terms Security risk analysis also referred called risk assessment, is a basic requirement of any organization. Essentially, controls and expenditures are largely commensurate with the risks to that an organization posses. many conventional means for conducting a security risk analysis are turning out to be more(prenominal) indefensible in terms of criticality, flexibility and usability. Qualitative Risk Analysis It is the most pervasively used approach to security risk analysis. No probability data is required and only estimates of potency loss are used. Elements of qualitative risk analysis Vulnerabilities These are factors that make a system prone to attack or make an intrusion more managely to succeed or lead an impact. For example, flammable material. Threats What could go wrong or something/ situations that can attack the information system. For instance, fraud or fire. Controls The countermeasures put up by management for vulnerabilities. They include preventive control, detective controls, deterrent controls etc. Security Risk Analysis for Intrusion Detection and Prevention of Cybercrime The satellite conference systems form the backbone of net centric warfare for the US Military and give it considerable advantage over others. The close integration of the communication system and its distribution to local level commanders puts this system far ahead of other armies as by (Bufkin 2011) This is unique feature of this system no other part of defense satellite system can relay information from the satellite all the way down to war fighters, portable communications packs and handheld radios. The system, however, like any other is not perfect and present some vulnerabilities in its operation. The modern communication systems have evolved and are far more secure than their predecessors. The interception methods have evolved along with these advancements and therefore security and threats are circling in an infinite loop. Both are constantly evolving. Contrary to popular opinion, cybercrime is a risk to all industries including military networks. If intrusion detection methods are not effective, cybercrimes results in security breaches long before the victims become aware that the systems are compromised. In case of milit ary networks, the put on the line are very high as the data includes sensitive information that may even include strategic plans, communication infrastructure details and even present situation reports. Any of these if intercepted can jeopardize complete communication network and leave military in a blackout. As per Foreign Affairs, confession and Trade Division in 2008

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.