Common Information Security Threats Paper

Submitted by: Submitted by

Views: 604

Words: 1188

Pages: 5

Category: Science and Technology

Date Submitted: 05/11/2013 01:12 PM

Report This Essay

Common Information Security Threats Paper

Courtney Gardner

CMGT/400

2-25, 2013

Terry Green

Common Information Security Threats Paper

The growing number of security treats an organization faces from day to day grows substantially as each day passes. Even the failed attempts to access secure data bear fruit of some kind in the form of another vulnerability being discovered or a different tactic is used that the company wasn’t prepared for. One organization that can’t afford not to be prepared is the Chase Bank organization. This financial institution is very accustomed to fending off skilled cyber thieves. It gets hit every day by thousands if not tens of thousands of attacks on their infrastructure and networks I will discuss three major threats that Chase faces DDoS attacks, Mobile Banking and Phishing. Transferring funds out of users' accounts is a major security treat they face. This can be achieved many ways which makes it an active job for the security admins of banks. Online banking has opened the banks to a wide variety of vulnerabilies that much be patched or mitigated to the lowest degree possible.

Being the victim of a DDoS attack is always a possibility for Chase as they contact a large amount of online tractions and overseas money handling. Attackers can employee DDoS attacks, or distributed denial of service attacks, named for denial of customer service by aiming large capacities of network traffic to a website until it forced to or collapse. To help combat the treat of a DDoS attack Chase could increase the networks bandwidth limits. Another technique that can reduce this treat is using alternate routing tools to move traffic to other locations or redirecting large amounts of network traffic to a cloud-based or off-website alternate website to help balance the load when the network traffic becomes too much for the network to handle. More expensive options include packet analysis appliances to handle separation of good and bad traffic, sending...