This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

External and Internal Threats

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

External and Internal Threats

External threats often refer to external forces outside the organization that uses malicious ways to get unauthorized access to the organization for ad intentions. Besides, they are usually after sensitive data that will damage the organization in one way or another. According to Peltier(2014), to prevent external threats, an organization has to implement counter security measures. This implies that first, you have to evaluate your system to derive the weak areas or identify vulnerabilities in the systems that could be exploited and sort them out. Second, train your employees on the aspects of security threats and how to handle them. Finally, retract excessive privileges from the workers and embrace new technologies such as the cloud.

Internal threats occur inside the organization mostly done y the employees themselves. Solms (2009) argues that in most cases, employees are irritated, for example missing on a promotion or lack of salary increase. Organization comes up with countermeasures concerning the prevention of internal attacks. First, you will train your employees on the workings of security measures to enable them to know what is at stake. Second, the physical location of data should be protected at all costs. Also, best practices should be applied when dealing with password security. For disgruntled employees, install a user action monitoring program that will keep tabs with the particular employees. Moreover, ensure the access to sensitive data in the organization is restricted to only reliable and dependable personnel. In the event, the irritated employees get worse; the best way is to replace them with competent workers.

The individuals that become external and internal threats are identifying y monitoring an abnormal behavior in the organization. This implies that anything out of the norm usually gives them away. For example, an external threat posing as a technician only to cross-check credentials to discover they are fake or non-existence after the individual exposes suspecting behavior.

Reference

H., V. S., & Solms, R. V. (2009). Information security governance. New York: Springer.

Peltier, T. R. (2014). Information security fundamentals. Boca Raton: CRC Press, Taylor & Francis Group.

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask