Itc 596 – Threat Landscape
Essay Preview: Itc 596 – Threat Landscape
Report this essay
ITC596 ASSESSMENT ITEM 3Consider the following Case study. Please use the following URL to download and read the ENISAThreat Landscape 2014 document.
Security PolicyEnsure a strong security policy is outlined and that it covers all aspects of breaches of this policy. Some examples of good policies can include:Unique passwords for each systemMandatory change of user passwords regularlyDual stage authentication of loginsWhitelisting of approved programs for installation on a domainRestriction of administration rights on users’ computers An example of this is from the Australian Signals Directorate listing 4 key mitigation strategies for protecting IT systems (Directorate, 2012)They include:Application WhitelistingPatching SystemsRestricting Administrative PrivilegesCreating a Defence-in-depth systemTrainingAs detailed in the Enisa 2014 document, over 50% of data breaches occur from user sloppiness (Marinos, 2014, P31). To combat this, user training on the effects of user sloppiness can assist in reducing this.An example of this in the USA from the National Archives and Records Administration (NARA) failing to scrub a hard drive being sent back to the supplier for a warranty repair. There was the potential of 70 million records of US Military veterans (Raywood, 2009)ControlsThe use of controls can limit Insider threats. Some examples of controls can include: Dual request commands for business critical system changes.Change of user passwords on a regular basis.Different passwords for individual systems so a breach can be contained.SecurityEnsuring assets are protected from unauthorised personnel creates a deterrent for Insider threats by implementing:Physical Security FencesSecure Swipe access doorsIsolated rooms for critical infrastructure4) Out of the ‘’Top threats’’ which threat would you regard to be the most significant and why?I would list Information Leakage & Identity theft/fraud equally as the most significant threat.My reason is, both of these threats have an increasing threat trend in 2014 for all emerging arears as advised by ENISA detailed on page (iv) (Marinos, 2014).The listed top threat trends included:Cyber-Physical Systems and CIPMobile ComputingCloud ComputingTrust InfrastructureBig DataInternet of ThingsNetwork Virtualisation Identity theft/fraud is difficult to detect and protect against. A report from Carnegie Mellon University detailed the time taken on average for detection of insider fraud averages approximately 2.5 years (Cummings, 2012).

Get Your Essay

Cite this page

Insider Threats And Top Threats. (July 13, 2021). Retrieved from https://www.freeessays.education/insider-threats-and-top-threats-essay/