logo image

Draft Risk Management Plan Essay

The top three security threats that Aim Higher College faces are the following: * Mobile devices connecting to the network * Social Medal * Compromised routers intercepting sensitive information These threats are the most common that any college faces. The threats have remained at the top of the list every year for a variety of reasons. This list of threats Is also unique to college campuses. I will discuss each of the threats in this report.

Students, especially college students, are consistently on some type of social media tie or on a mobile device that gains them that type of access. There are many varieties of devices such as tablets, smartness, laptops, and now even checkmates. Devices such as these are connecting to wireless networks whether it’s from a service provider or campus. With these connections many aren’t just using them for social media, but also for checking grades, schedules, or relevant news. The devices depend on connecting to networks but also need to do so in a secure fashion.

Each device has to be checked for viruses, spare, and other types of mallard while still maintaining the GIG-A triad. A balance must be found between usability and security. Each time a

Need essay sample on "Draft Risk Management Plan"? We will write a custom essay sample specifically for you for only $ 13.90/page

remote device is connected to the network there is a possibility that the network can be compromised by one these devices. Every device should be authenticated, scanned, and identified. Many are unaware of the risks that can come from connecting to networks, especially wireless access. The use of social media has increased in recent years and according to this chart we can see according to age groups how many are connecting to social media.

Students and teachers both use things like Faceable, Misplace, Linked, Mainstream and many ore. These applications have the potential to transmit mallard every time they are used on the campus network. Mallard can be embedded in everything from videos to comments. Any time a student or teacher clicks on a video viruses, keystroke loggers, or worms can be installed and start destroying or intercepting data. The Infected devices must be Identified quickly and the mallard removed while still allowing others to access the websites.

Another challenge unique to social media is the fact that not only Is there a potential network impact, but students may be caught or violations to campus policy on their own time. Social media Is being scrutinized on a massive scale and students and teachers both must watch the types of posts they posting on these sites. Posting personal beliefs that could be construed as hate or Ignorance. Posts against faculty or staff could cause a person to be expelled or fired depending on the situation. People posting pictures or videos of themselves in lewd or mischievous acts could be reprimanded for their actions.

Most believe these toy 2 making it public especially when sharing with others. The last threat in the list is a improvised router intercepting sensitive information. As the core routing system for the Internet, BGP defines the most efficient route for Internet data to be transmitted around the world, deciding which “links” carry Internet data. Think of it as the Internet’s navigation system, providing turn-by-turn directions for all Internet connections. By hijacking the BGP translations, attackers can drive unsuspecting surfers and/or students, faculty and staff attempting to access the university network to malicious sites.

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
Complete Buyer Protection
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy