All papers examples
Get a Free E-Book!
Log in
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Identifying Potential Risk, Response, and Recovery, Essay Example

Pages: 4

Words: 1095

Essay

Malicious attacks can be detrimental to computer networks. Examples include snooping or sniffing, data alteration or modification, IP address or identity spoofing, password-based attacks, and denial of service. Fortunately, there are strategies to manage these risks by avoidance, mitigation, assignment, or acceptance. Though avoiding all computer access is an option, for those in the video game industry, it is not a practical solution and would be detrimental to business. Certain factors can increase vulnerabilities to attacks. Overall, the most sensible approach is to reduce the risk as much as possible by taking precautions and ensuring that there are effective methods to correct any problems caused by malicious attacks.

Most risks are reduced by having strong passwords, a firewall, and good encryption systems. Computer companies in the video game industry should engage in risk assignment by purchasing insurance for the network software and data. Gaming companies may also consider having their customers sign disclaimers and consent forms which would help to ensure that they be responsible in part for the security of their own computers, information, and passwords. Most customers have no problems in complying with this request.

Snooping or sniffing is a malicious attack which occurs when access is gained to a network’s data path where attackers can read the network data and information. Invading assailants are able to spy on the company and obtain important information. Snooping and sniffing are difficult to detect and can be dangerous to a network’s security. Risk mitigation can be implemented by asymmetric encryption. This is an effective method of encryption where is a public key required to access information, as well as a private key for the recipient of the message. Security is improved in communication with customers and colleagues. Another way to mitigate snooping and sniffing is to have an up-to-date antispyware program. Asymmetric encryption and antispyware are both preventative and involve the use of the administration of the video game company. In addition to prevention, the antispyware program can detect and correct potential problems if they do arise.

Data alteration or modification occurs when attackers gain access to a computer network and corrupt the data by altering codes and instructions. Risk mitigation can be implemented by having updated technology, a good firewall, and antispyware and antivirus programs. Strong asymmetric encryption programs and passwords are preventative in these types of attacks. Reliable administration programs are required for these encryption systems to be effective. Firewalls, antiviral, and antispyware programs are all extremely preventative against attacks and antispyware and antivirus programs may also be able to detect and correct any activity.

IP address or identity spoofing occurs when attackers use valid IP addresses where they pretend to be legitimate users to corrupt, destroy, or reroute data. Having newer routers and a strong firewall can help to reduce these risks. These preventative procedures help to ensure that information is secure and users’ profiles are protected. Communication among the administration must be strong in order to prevent this type of attack.

Password-based attacks occur when an attacker is able to access a network by deciphering passwords, which grants them the ability to engage in malicious activities such as altering servers and network configurations or obtaining private user details. Risk mitigation can be implemented by having strong passwords. There are certain software programs and individuals who will be able to decode these passwords, so having an asymmetric encryption system is a necessity for prevention.

Denial-of-service attacks occur when valid system users are prevented from accessing normal computer services within or from the network. The result of this is that clients and customers may be denied access to the company’s servers. With application layer attacks, the attacker seeks to ruin server applications operating systems. Risks can be mitigated and prevented by having an asymmetric encryption system and using strong passwords. Administration will need to monitor these factors so customer service will not be negatively affected.

Certain factors make networks more vulnerable to attacks. These occur due to weak encryption services, older systems technology, and the use of laptops and wireless systems.

Absence of an encryption serve increases a network’s vulnerability to malicious attacks. Because asymmetric encryption services require both public and private passkeys, they prevent attacks and mitigate risks. Administration and communication must be solid within the company for this to be effective.

Older technology systems can leave networks vulnerable to attacks because intruders may be familiar with the methods of attacking these systems, encryptions may be weak, and passwords may not be concealed. Fortunately, this can be easily remedied by using updated technology. By avoiding the risk of using old technology, many problems can be prevented. If companies choose to use older technologies, they must accept that there is a certain amount of risk involved and should consider in investing in antispyware and antivirus programs. These programs can help to prevent attacks, and detect and correct any problems. However, if companies work with updated technology, risk assignment can be implemented as most new technologies come with insurance and warranties. By using older technologies risk assignment may not be possible. There is always risk of using any technology; for gaming companies, having updated technology helps to mitigate these risks.

Other factors may not be as easily correctible when preventing malicious attacks. Using laptops and wireless access points leave networks vulnerable to attacks. Because laptops are mobile and may have unsecure Ethernet cables, they are easily broken into by attackers. Wireless access points are vulnerable even with the use of strong encryptions are used. A certain measure of risk acceptance is necessary when using a laptop and wireless networks. However, due to the mobile nature of some business, the usage of laptops and wireless networks may be a necessity. Stationary computers are not always convenient, so risk assignment and mitigation should be implemented. For risk assignment to be implemented, software and data should always be insured.

Risk mitigation with both laptops and wireless usage should involve asymmetric encryption services and strong passwords. These methods can help to prevent malicious attacks from occurring. Antispyware and antivirus programs can also be beneficial in preventing attacks along with the added benefit of detecting and correcting problems. For wireless usage, procedures should be followed. File-sharing should be limited, though for video gaming companies, this may not be a possibility. It should also be recommended to use only HTTPS websites whenever possible.

The nature of video gaming requires the acceptance of some risk. Unless the Intranet is avoided altogether, risk can never be completely eliminated. While risk assignment is often a good way to manage threats, taking measures to mitigate risks is often the most balanced solution to prevent malicious attacks.

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Essay Samples & Examples

Voting as a Civic Responsibility, Essay Example

Voting is a process whereby individuals, such as an electorate or gathering, come together to make a choice or convey an opinion, typically after debates, [...]

Pages: 1

Words: 287

Essay

Utilitarianism and Its Applications, Essay Example

Maxim: Whenever I choose between two options, regardless of the consequences, I always choose the option that gives me the most pleasure. Universal Law: Whenever [...]

Pages: 1

Words: 356

Essay

The Age-Related Changes of the Older Person, Essay Example

Compare and contrast the age-related changes of the older person you interviewed and assessed with those identified in this week’s reading assignment. John’s age-related changes [...]

Pages: 2

Words: 448

Essay

The Problems ESOL Teachers Face, Essay Example

Overview The current learning and teaching era stresses globalization; thus, elementary educators must adopt and incorporate multiculturalism and diversity in their learning plans. It is [...]

Pages: 8

Words: 2293

Essay

Should English Be the Primary Language? Essay Example

Research Question: Should English be the Primary Language of Instruction in Schools Worldwide? Work Thesis: English should be adopted as the primary language of instruction [...]

Pages: 4

Words: 999

Essay

The Term “Social Construction of Reality”, Essay Example

The film explores the idea that the reality we experience is not solely determined by objective facts but is also shaped by the social and [...]

Pages: 1

Words: 371

Essay

Voting as a Civic Responsibility, Essay Example

Voting is a process whereby individuals, such as an electorate or gathering, come together to make a choice or convey an opinion, typically after debates, [...]

Pages: 1

Words: 287

Essay

Utilitarianism and Its Applications, Essay Example

Maxim: Whenever I choose between two options, regardless of the consequences, I always choose the option that gives me the most pleasure. Universal Law: Whenever [...]

Pages: 1

Words: 356

Essay

The Age-Related Changes of the Older Person, Essay Example

Compare and contrast the age-related changes of the older person you interviewed and assessed with those identified in this week’s reading assignment. John’s age-related changes [...]

Pages: 2

Words: 448

Essay

The Problems ESOL Teachers Face, Essay Example

Overview The current learning and teaching era stresses globalization; thus, elementary educators must adopt and incorporate multiculturalism and diversity in their learning plans. It is [...]

Pages: 8

Words: 2293

Essay

Should English Be the Primary Language? Essay Example

Research Question: Should English be the Primary Language of Instruction in Schools Worldwide? Work Thesis: English should be adopted as the primary language of instruction [...]

Pages: 4

Words: 999

Essay

The Term “Social Construction of Reality”, Essay Example

The film explores the idea that the reality we experience is not solely determined by objective facts but is also shaped by the social and [...]

Pages: 1

Words: 371

Essay