Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Identifying Potential Risk, Response, and Recovery, Essay Example
Hire a Writer for Custom Essay
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
Malicious attacks can be detrimental to computer networks. Examples include snooping or sniffing, data alteration or modification, IP address or identity spoofing, password-based attacks, and denial of service. Fortunately, there are strategies to manage these risks by avoidance, mitigation, assignment, or acceptance. Though avoiding all computer access is an option, for those in the video game industry, it is not a practical solution and would be detrimental to business. Certain factors can increase vulnerabilities to attacks. Overall, the most sensible approach is to reduce the risk as much as possible by taking precautions and ensuring that there are effective methods to correct any problems caused by malicious attacks.
Most risks are reduced by having strong passwords, a firewall, and good encryption systems. Computer companies in the video game industry should engage in risk assignment by purchasing insurance for the network software and data. Gaming companies may also consider having their customers sign disclaimers and consent forms which would help to ensure that they be responsible in part for the security of their own computers, information, and passwords. Most customers have no problems in complying with this request.
Snooping or sniffing is a malicious attack which occurs when access is gained to a network’s data path where attackers can read the network data and information. Invading assailants are able to spy on the company and obtain important information. Snooping and sniffing are difficult to detect and can be dangerous to a network’s security. Risk mitigation can be implemented by asymmetric encryption. This is an effective method of encryption where is a public key required to access information, as well as a private key for the recipient of the message. Security is improved in communication with customers and colleagues. Another way to mitigate snooping and sniffing is to have an up-to-date antispyware program. Asymmetric encryption and antispyware are both preventative and involve the use of the administration of the video game company. In addition to prevention, the antispyware program can detect and correct potential problems if they do arise.
Data alteration or modification occurs when attackers gain access to a computer network and corrupt the data by altering codes and instructions. Risk mitigation can be implemented by having updated technology, a good firewall, and antispyware and antivirus programs. Strong asymmetric encryption programs and passwords are preventative in these types of attacks. Reliable administration programs are required for these encryption systems to be effective. Firewalls, antiviral, and antispyware programs are all extremely preventative against attacks and antispyware and antivirus programs may also be able to detect and correct any activity.
IP address or identity spoofing occurs when attackers use valid IP addresses where they pretend to be legitimate users to corrupt, destroy, or reroute data. Having newer routers and a strong firewall can help to reduce these risks. These preventative procedures help to ensure that information is secure and users’ profiles are protected. Communication among the administration must be strong in order to prevent this type of attack.
Password-based attacks occur when an attacker is able to access a network by deciphering passwords, which grants them the ability to engage in malicious activities such as altering servers and network configurations or obtaining private user details. Risk mitigation can be implemented by having strong passwords. There are certain software programs and individuals who will be able to decode these passwords, so having an asymmetric encryption system is a necessity for prevention.
Denial-of-service attacks occur when valid system users are prevented from accessing normal computer services within or from the network. The result of this is that clients and customers may be denied access to the company’s servers. With application layer attacks, the attacker seeks to ruin server applications operating systems. Risks can be mitigated and prevented by having an asymmetric encryption system and using strong passwords. Administration will need to monitor these factors so customer service will not be negatively affected.
Certain factors make networks more vulnerable to attacks. These occur due to weak encryption services, older systems technology, and the use of laptops and wireless systems.
Absence of an encryption serve increases a network’s vulnerability to malicious attacks. Because asymmetric encryption services require both public and private passkeys, they prevent attacks and mitigate risks. Administration and communication must be solid within the company for this to be effective.
Older technology systems can leave networks vulnerable to attacks because intruders may be familiar with the methods of attacking these systems, encryptions may be weak, and passwords may not be concealed. Fortunately, this can be easily remedied by using updated technology. By avoiding the risk of using old technology, many problems can be prevented. If companies choose to use older technologies, they must accept that there is a certain amount of risk involved and should consider in investing in antispyware and antivirus programs. These programs can help to prevent attacks, and detect and correct any problems. However, if companies work with updated technology, risk assignment can be implemented as most new technologies come with insurance and warranties. By using older technologies risk assignment may not be possible. There is always risk of using any technology; for gaming companies, having updated technology helps to mitigate these risks.
Other factors may not be as easily correctible when preventing malicious attacks. Using laptops and wireless access points leave networks vulnerable to attacks. Because laptops are mobile and may have unsecure Ethernet cables, they are easily broken into by attackers. Wireless access points are vulnerable even with the use of strong encryptions are used. A certain measure of risk acceptance is necessary when using a laptop and wireless networks. However, due to the mobile nature of some business, the usage of laptops and wireless networks may be a necessity. Stationary computers are not always convenient, so risk assignment and mitigation should be implemented. For risk assignment to be implemented, software and data should always be insured.
Risk mitigation with both laptops and wireless usage should involve asymmetric encryption services and strong passwords. These methods can help to prevent malicious attacks from occurring. Antispyware and antivirus programs can also be beneficial in preventing attacks along with the added benefit of detecting and correcting problems. For wireless usage, procedures should be followed. File-sharing should be limited, though for video gaming companies, this may not be a possibility. It should also be recommended to use only HTTPS websites whenever possible.
The nature of video gaming requires the acceptance of some risk. Unless the Intranet is avoided altogether, risk can never be completely eliminated. While risk assignment is often a good way to manage threats, taking measures to mitigate risks is often the most balanced solution to prevent malicious attacks.
Stuck with your Essay?
Get in touch with one of our experts for instant help!
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee