4. Control design and evaluation – Mandatory steps should be executed to minimize the risks of vulnerabilities on the business of GambleBet. Strict regulations should be communicated publicly in any misuse of assets of GambleBet. The authentication methods should be improved and enhanced by using authentication mechanism where users should remember user/login id and password. Magnetic stripe card is another mechanism to facilitates something …show more content…
HackStop Pty Ltd:-is independent IT security specialists which would do following duties in this investigation.
Analysis the security of GambleBet IT infrastructure
Define whether GambleBet is the cause of the fraud
Account on what can be completed to alleviate security subjects and ongoing to reduce the probability of further fraud.
8. Big Frog Software: - GambleBet’s online betting system application and credit card processing system is developed and managed by BigFrog Software. Any loopholes and vulnerabilities identified in risk analysis would be considered and take care of. Any weaknesses of software would be highlighted by us during the investigation.
Set of recommendations
Recommendations for GambleBet company to secure their sensitive information from the hackers are as follows:-
Access controls describe what activities a user can do or what objects an operator is permitted to access. Access controls are constructed upon the substance of elements designed to ease the matching of an operator to a development. These elements are identification, authentication and authorisation which are also called as …show more content…
Access control should applied in securing information to avoid any unauthorised access to the server or network of Gamblebet betting system. With the help of this access control, users would be able to authenticate their identity and it helps to the users to regulate online betting system the way they would like to operate it. An access control matrix delivers the simplest structure for demonstrating the procedure of access control. GambleBet should be able to understand the access control matrix as it is very rarely applied in computer and network systems because it is tremendously expensive in terms of storage space and processing. Access control lists (ACLs) is very common in applying in a system for the development of access controls which have access rights to particular object. With the help of ACLs, GambleBet would be able to identify specific access if hacker attack on network or servers of GambleBet. There are three kinds of access control which are read, write and execute. GambleBet should know how controls are defined model of access which comprises Discretionary access control (DAC), mandatory access control (MAC), role based access control (RBAC) and rule-based access control (also