Professional Documents
Culture Documents
Spring 2015
Assignment No. 1
ID:
MS150200187
Name:
Muddssar Hussain
Question No.1
In this world of Information Technology the business corporations are
converging digitally for exchange of information with their customers and business
partners electronically through internet. But internet is a threat environment where
Bad Peoples like hacker and lot of threats in the form of viruses can harm business
goals.
Some of the most important threats which can harm your business are as follows:
Threats to a wireless network:
Disgruntled employees
Phreaker
White hat
Black hat
Trojan horses and Rootkits
Spywares
Social Engineering attacks
Phishing
Scams
Denial of Service (DoS) Attacks
Fraud, Theft
Stealing Sensitive data about customers and employees
Identity theft
Financial and Intellectual Property Theft
Brute force key cracking
I will use digital water marking techniques to hide the data in an image, audio
clip other work of media with the work itself. It is hidden from the user in
normal use but become visible after some especial viewing process.
Proper prevention measures from being attacked
Proper ways and procedures to detect breaching
I will establish well defined procedure to get may business back on track after
it has been breached or some damage have done..
Install and maintain an effective firewall configuration to protect my network.
I will use advance encryption techniques to secure sensitive company data.
I will use Updated and well known antivirus software.
I will develop strong password policies
Proper User authentication
Secure and encrypted Wi-Fi protected access
Job logs/ access logs
IP filtering
Question No.2
Ex-employees are very dangerous for an organization because they can
breach into to the network in many ways. Some of the possibilities of breaching into
networks are as under: