In: Computer Science
A-2 Develop, assess, and document security policies, practices, and procedures?
C-1 Identify and assess current and anticipated security risks and vulnerabilities?
C-2 Evaluate current and emerging tools and technologies?
Below must be followed as a part of security policy and procedure-
1. Periodic software updates should be installed in order to have the latest patches capable of handling latest threats.
2. All the nodes connected to the network should have a recognised and world recommended Anti-virus software.
3. Auditing—These procedures can include what to audit, how to maintain audit logs, and the goals of what is being audited.
4. Administrative—These procedures can be used to have a separation of duties among the people charged with operating and monitoring the systems. These procedures are where you can show that database administrators should not be watching the firewall logs.
5. Access control—These procedures are an extension of administrative procedures that tell administrators how to configure authentication and other access control features of the various components.
6. Configuration—These procedures cover the firewalls, routers, switches, and operating systems.
7. Incident response—These procedures cover everything from detection to how to respond to the incident.
Ans 2- Anticipated security risks
Supercharged connectivity and the IoT will bring unmanaged risks
Crime syndicates will take quantum leap with crime-as-a-service
New regulations will bring compliance risks
Brand reputation and trust will be a target.
Below are the current risks-
1. Virus- viruses are malacious prgrams that have the capabilty to duplicate itself and performa malfunctions to the system
2. Advanced Phishing Scams
Most phishing scams are fairly transparent, and sophisticated users rarely fall for pop-ups asking for a password even though less-sophisticated users are still vulnerable to these
3. Denial of service attack
4. Ransomewares
Answer 3-
Current Tools -
1. Antiviruses and malware detectors-
These are the softwares specifically built to scan the computer files by comparing the contents with the virus signatures stored in its databases.
Emerging tools-
1. User-behavior analytics
Once someone's username and password are compromised, whoever has them can waltz onto a network and engage in all kinds of malicious behavior
2. Hardware authentiction-
Intel is moving in that direction with the Authenticate solution in its new, sixth-generation Core vPro processor. It can combine a variety of hardware-enhanced factors at the same time to validate a user's identity.