Suggested Format For Essay #1 For Is 6813/Mot 6203 Topic: A Disruptive Technology
Friday, October 18, 2019
Security Risk Analysis for Intrusion Detection and Prevention of Essay
Security Risk Analysis for Intrusion Detection and Prevention of Cybercrime - Essay Example Data and alert correlation in the military network and the future of intrusion detection and prevention methods are touched upon. The paper recommends appropriate procedures to control the threats and reduce the vulnerability of the system to lower the level and make them acceptable keeping in mind the military network and the sensitivity of data protection in this case. Top five risks are analyzed and briefly reviewed. Current federal legislation and the standards based on securing and preventing cybercrime will be analyzed. Steps will be recommended to implement and maintain the strategy proposed. Risk analysis terms Security risk analysis also referred called risk assessment, is a basic requirement of any organization. Essentially, controls and expenditures are largely commensurate with the risks to that an organization posses. Many conventional means for conducting a security risk analysis are turning out to be more indefensible in terms of criticality, flexibility and usability. Qualitative Risk Analysis It is the most pervasively used approach to security risk analysis. No probability data is required and only estimates of potential loss are used. Elements of qualitative risk analysis: Vulnerabilities ââ¬â These are factors that make a system prone to attack or make an intrusion more likely to succeed or have an impact. For example, flammable material. Threats ââ¬â What could go wrong or something/ situations that can attack the information system. For instance, fraud or fire. Controls ââ¬â The countermeasures put up by management for vulnerabilities. They include preventive control, detective controls, deterrent controls etc. Security Risk Analysis for Intrusion Detection and Prevention of Cybercrime The satellite communication systems form the backbone of net centric warfare for the US Military and give it considerable advantage over others. The close integration of the communication system and its distribution to local level commanders puts this system far ahead of other armies as by (Bufkin 2011) ââ¬Å"This is unique feature of this system ââ¬â no other department of defense satellite system can relay information from the satellite all the way down to war fighters, portable communications packs and handheld radiosâ⬠. The system, however, like any other is not perfect and present some vulnerabilities in its operation. The modern communication systems have evolved and are far more secure than their predecessors. The interception methods have evolved along with these advancements and therefore security and threats are circling in an infinite loop. Both are constantly evolving. Contrary to popular opinion, cybercrime is a risk to all industries including military networks. If intrusion detection methods are not effective, cybercrimes results in security breaches long before the victims become aware that the systems are compromised. In case of military networks, the stakes are very high as the data includes sens itive information that may even include strategic plans, communication infrastructure details and even present situation reports. Any of these if intercepted can jeopardize complete communication network and leave military in a blackout. As per Foreign Affairs, Defense and Trade Division in 2008 ââ¬Å"
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.