IT-FP3358_SlocumDean_Assessment2-1.docx - PERIMETER...

This preview shows page 1 - 4 out of 7 pages.

PERIMETER SECURITY STRATEGY1Assessment 2: Perimeter Security StrategyDean M. SlocumCapella University
PERIMETER SECURITY STRATEGY2Vulnerabilities and threats with data.Capital One, being an institution that primarily deals in finance, has many threats andpotential vulnerabilities to data. The data itself, can either be stored, in transit, or in use. At allthree states, the data is at some form of risk. Generally speaking, data in transit, or motion, is atthe highest level of risk. This is due to administrators no longer having control of the data once itleaves the internal network. Attacks are common for this data state. However, other issues canarise as well. Human error can play a major part in this problem. This error occurs whenconfidential data is sent, either maliciously or inadvertently, to a user that has no form oflegitimate access to the data. The same error can occur if the data is made public. On the otherhand, mimic-based attacks are common. This type of threat will copy or mirror a Wireshark typeintercept that will allow the intended system and attacking system to receive the same data. Thisattack is silent and generally will not raise any alerts from the sending system due toacknowledgement packets not being interfered with (Berecki, 2020).Data at rest can refer to any data that is stored on a device or in a cloud-based system.While this data state is not moving, it is still prone to attack. These threats can come in the formof outdated security measures in areas such as firmware, firewalls, VPNs, anti-virus protection,etc. Malware and Trojan attacks are common as well. These can all be avoided via constantmonitoring and updating of security protocols in relation to OS, hardware, and software.Download restrictions and personal email protocols can also aid in this (Andrews, 2018).Data in use is considered to be data that is currently being processed by one or moreapplications and is constantly updated by multiple users within a network. Human error canagain play a large part in threats to this state of data. This form of data can be also be known asmemory. It can contain digital certificates and encryption keys. If an outside party had physical
PERIMETER SECURITY STRATEGY3access to a system’s random access memory, they could then go on to parse the data in use forsaid certificates and encryption keys. They could then decrypt any data at rest. This is commonin cold boot attacks and rootkits (Yasin, 2012).

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 7 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Spring
Professor
NoProfessor
Tags
Cryptography, Computer Security, hash function, Block cipher, Andress

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture