Human Nature - A Threat to Security

Discusses human nature as a threat to security.

Lucas Allen
Contributor
4.3
56
10 months ago
Preview (4 of 10 Pages)
100%
Log in to unlock

Page 1

Human Nature - A Threat to Security - Page 1 preview image

Loading page ...

1Human Nature-A Threat to SecurityHuman Nature-A Threat to SecurityTitle:Student’s Name:Professor’s Name:Date:Discuss the various security threats faced by organizations and the techniques that can beimplemented to mitigate these risks. In youranswer, explain the importance of physical securitymeasures, biometric systems, firewalls, and access control strategies. Additionally, analyze howhuman behavior impacts organizational security and describe the effective measures that can betaken during the hiring process to ensure the security of an organization. Finally, providerecommendations for organizations to improve their overall security posture.Requirements:Your response should be3 to 4 pagesin length (double-spaced).Ensure your paper is formatted according toAPA style.

Page 2

Human Nature - A Threat to Security - Page 2 preview image

Loading page ...

Page 3

Human Nature - A Threat to Security - Page 3 preview image

Loading page ...

2Human Nature-A Threat to SecurityIntroductionIn every business organization, security is one of the most importantaspectsof anybusinessprocess because it’s the first most priority that has to be taken care in order to secureorganization from security threats. Security threats can be in many forms may be humaninteraction, attacking sites and blogs, hijacking servers and spying on personal information andmails. These threats results in loss of confidential data and sensitive information belonging toany organization.Intruders captureongoing traffic of any business organization and theymanipulates and retrieves confidential information related to business organization. There are somany techniques through which an intruder or attacker may attack any organization or steals datasuch as: social engineering, phishing, cross-site scripting and Denial of Service attack.The mostcommon attacking technique that attackers use is social engineering.Social Engineering is a kindof attack in which detailed information about victim is extracted from personal blogs, sites themvisiting and by following him physically. There are many ways in which personal informationcan be breached by attackers such as gathering of information from social media sites becausemost of the users share information on media sites.Techniques to Mitigate RisksThe techniques that organizations should implement to mitigate the security threats variesfrom organization to organization. The securitymeasures haveto be taken care from a smallpaper to physical drives that can be carried by visitors or users inside the organizations. The firsttechnique that has to be implemented is the scanning system at the entrance of an organizationfrom where the individuals used to come inside and every small items or devices has to be

Page 4

Human Nature - A Threat to Security - Page 4 preview image

Loading page ...

3Human Nature-A Threat to Securityscanned thoroughly. Thescanners haveto be updated that can triggers whenever found anyphysical media devices or hard material inside bags, so that security incidents can be prevented.The scanning machines has to be implemented such that they can read codes even on small chipsthat remains undetected in some scanning machines. These electronic chips can store largeamount of data just by attaching them with any storage device using some mediator. The otherthreat is the hiding of drives within shielded plastic case through which scanner cannot scaninside. The second technique that has to be used in order to prevent security threats is thebiometricsystems, whichhas to be implemented to identify physical identity of a person.The simple identity card scanning system can be bypassed using electronic chips, so as tomake sure that the person entering the zone is the authorized individual, biometric system has tobe implemented.These biometric systems haveto be configured in such a way that they canrecognize palm or eyes or any other identity of a person that has already there in the database.There are numerous biometric systems already present in the market like face detection systems,palm reading, thumb detection and eye scanning system and various other biometric systems.These biometric systems has to be triggered in such a way that if any identity of an individual didnot match to the database, then it has to raise an alarm and locks the door of the zone, so thatsecurity incident can be measured and person doing this taken under security.The third technique that has to be done is by implementing firewall within the internaland external network. The firewall is one of the most important security aspect because whateverthe traffic that is passing through firewall willbe filtered out by organizations securityadministrators while configuring the firewalls. Consider a situation in which a user visited virusprone site or unauthorized that can collect cookies from website automatically without users’
Preview Mode

This document has 10 pages. Sign in to access the full document!