Essay On Threats To The Embassy

Improved Essays
The following is a list and brief detailing of the organizations current risks. These threats are generalized there is a specific list of threats to the embassy listed later.
Risks and Challenges
Acts of Nature Include Lightening storms, hail storms, tornado’s earthquakes floods or any other natural disaster you could think of that could possibly disrupt daily operations and make data unavailable for any reasons.
Dependency Failures Include systems or personal that become inoperable that are outside our control to repair. This includes 3rd party application or cloud storage, also includes the termination of critical employee example would be a system administrator resigns, or subject matter expert was terminated.
System and Environmental Failures
…show more content…
External Attack. Is just like internal attacks only deployed from outside the network in an attempt to gain entrance and elevated privileges. These attacks seek to harm the company its employees, or customers and data.
Social engineering is always a threat and exposes every user in the organization as a possible unknowing accomplish to an attack.
Data breach will be the main threat in the Embassy. There is a large amount of classified information that could be leaked to the wrong person at any time. If a guest happens to see information that’s classified that is technically a data breach.
Virus and emails that contain applications or malicious software could make it into the network through social engineering or lack of user training.
Regular Operating system exploits and vulnerabilities are a common threat for all aspects of IT security. Rouge access points, and seemingly misplaced thumb drives could be gateways into bad times in IT
…show more content…
These regulations or procedures will probably come from higher up in our organization and disseminated to use through pre-established means, but we do not have this information yet.
FISMA Compliance
“In order to reach FISMA compliance all departments and agencies are required to coordinate and cooperate with the Department of Homeland Security as it carries out its cyber security responsibility and activities as noted in the OMB Memos 10-15 and 10-28. Any updates or changes to practices will be implemented as quickly as it is safe to do so”. (FISMA, 2015)
“Department of Homeland Security activities will include (but will not be limited to):
• overseeing the government-wide and agency-specific implementation of and reporting on cyber security policies and guidance;
• overseeing and assisting government-wide and agency-specific efforts to provide adequate, risk-based and cost-effective cyber security;
• overseeing the agencies ' compliance with FISMA and developing analyses for OMB to assist in the development of the FISMA annual report;
• overseeing the agencies ' cyber security operations and incident response and providing appropriate assistance;

Related Documents

  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Unit 1

    • 360 Words
    • 2 Pages

    It is a problem for anyone because everyone is dependent on such devices. The threat of damage or infiltration becomes more and more important and crucial in case of larger organization. All the organizations are now shifted to storing data on computer from manual storage of data. This shows that the most important thing for organizations is their computers. Servers of some organizations could have data worth millions of dollars, for example servers…

    • 360 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Internet Usage The possibility of being attacked by a hacker of any kind is very real. This understanding is why an organization should limit the availability of Internet websites across the board. In doing so this helps mitigate potential threats from malicious software and users from stealing valuable data that belongs to the…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    IS3110 Lab Answers

    • 739 Words
    • 3 Pages

    1. What are the danger to the system? There numerous dangers that can put your system at danger, for example, infections, spyware, worms, Trojans and PC programmers. Your systems are additionally helpless excessively critical who perpetrate cybercrimes. 2.…

    • 739 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    EXECUTIVE ORDER 13735 Executive Order 13735, “Providing an Order of Succession Within the Department of the Treasury,” was issued on August 12, 2016 by President Barrack Obama. This executive order lays out the order of succession should the Secretary of the Treasury be unable to perform his or her duties due to death, resignation, or is unable to fulfill their duties of the office. The Executive Order also describes the exceptions to the order.…

    • 445 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    P1 Unit 6 Business

    • 462 Words
    • 2 Pages

    For instance loss of time in a business can cause major issues like money loss and also the frustration for customers and staff. The problems that can cause the loss of time can be like power cuts, floods, fires or a user infecting the network by putting in a USB which can be potentially infected from their home computers. To stop this happening in a short time you should have some emergency generators, data backups this is a good plan when the system is offline. Business information loss: If a business has an unsecured network, other big companies can use that time to see any of the records for that business. There are some programs online which allow you to access any important information such as account names, usernames, password and many more on an unsecured wireless network.…

    • 462 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    There are some very specific goals outlined in the policy. The first goal of EO 13636 is “enhance the security and resilience of the Nation's critical infrastructure and to maintain a cyber environment that encourages efficiency, innovation, and economic prosperity while promoting safety, security, business confidentiality, privacy, and civil liberties” (EO No. 13636). The second goal of the policy is to increase the information sharing between the United States government and the private industry. The U.S government wants to “increase the volume, timeliness, and quality of cyber threat information shared with U.S. private sector entities so that these entities may better protect and defend themselves against cyber threats” (EO No.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The Federal Information Security Management (FISMA) was set up by the United States government for cyber security purposes such as to increase the level of security of software applications, systems and databases. As stated by (Kim, n.d.), “When FISMA was enacted, its purpose was to ensure that federal agencies secure the information contained in the non-defense information systems of the Unites States government”. To protect the systems and data it is important to have a security plan developed for not just federal agencies but also for the government contractors and organizations affiliated with the information. According to (Kim, n.d.), “These grades have trended slightly upward in recent years, with the grades from 2005 through 2007 being…

    • 166 Words
    • 1 Pages
    Improved Essays
  • Superior Essays

    Identify strategies to control and monitor each event to mitigate risk and minimize exposure Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    The first United States Customs and Border Services were established in July of 1789. Customs were created to collect the taxes on goods that were imported it was a much needed source of revenue for the new government. In 1819 the first federal law concerning immigration was enacted the law put in place standards and operation procedures for dealing with the increasing immigrant problem. Ships captains were to create a manifest of all immigrants, who they were, were they came from, and were they planned on going to. Within one year over 100,000 immigrants came to the United States.…

    • 756 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Under the impression that the United States was secretly in cahoots with France due to their alliance, despite the implementation of the Neutrality Acts, the British attacked American vessels in the French West Indies. They seized 300 merchant ships and hundreds of seamen, some of whom they employed on their own ships and others they incarcerated in dungeons. In 1794 Washington sent John Jay to London to treat with the British about their violations of America’s neutral rights but, due in part to Hamilton selling out Jay’s bargaining tactics to the Britons, he instead ended up binding American merchants to pre-Revolutionary debts, received only tentative assurance that Britain would remove her posts on U.S. soil, and none at all that they would cease future maritime attacks and seizures.…

    • 1184 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Essay On Border Safety

    • 1509 Words
    • 7 Pages

    Have you ever heard or seen those scary border stories? Do you ever watch documentaries or television shows, even the news on the border safety? Over 32% of all inmates in state prisons in the U.S. were under the influence of drugs or caught with possession of drugs. Drug enforcement agencies or DEAs makes over 30,000 arrests each year due to illegal narcotics. Nearly 48,000 people have been killed over the past 5 years in Mexico due to suspected drug-related violence.…

    • 1509 Words
    • 7 Pages
    Superior Essays
  • Great Essays

    On Border Security: America’s Approach to National Security and Economic Opportunity The current state of immigration policy in this country requires change. Many advocate for stronger and more enforced borders, but some call into question the effectiveness and economic soundness of this approach. Those, that oppose building up our borders, call for reforming worker visa programs and making legality easier to attain for those that will cross illegally into the United States anyways. Most desire a secure border which would allow a controlled flow of immigrants into the United States. This paper explores the numerous reasons for and against increased United States-Mexico border security as well as alternative policies available for implementation…

    • 1460 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Information Security Breach these days has been a popular subject in news. Almost every companies have been hacked, if not yet, they should not consider themselves as more secure than others that have already been there. In December 2013, Target was one of the victims with more than 40 million credit cards and debit cards that were stolen by malicious people. Just right before Thanksgiving a malware was installed inside target database.…

    • 1715 Words
    • 7 Pages
    Great Essays
  • Great Essays

    Cyber Domain Case Study

    • 1692 Words
    • 7 Pages

    Introduction The cyber domain is perhaps the most complex domain to define in modern warfare. Academic literature has secured cyber as both a domain and part of the global common. National laws, policies, and understanding of the cyber domain are just being to mature; thus, the strategy to guide and form the required organizations to support cyber is just being to develop. This paper will consider whether the current national cyber construct is sufficient to address the cyber domains unique geography.…

    • 1692 Words
    • 7 Pages
    Great Essays