Threat Identification, Cryptosystems, and Cybersecurity
Institution
Student name
Course
Date
Discuss how threat identification should be performed within your organization or university. Should every threat be planned for? Why or why not?
The threat identification procedure examines Information Technology vulnerabilities and determines their capacity in compromising the organization or university systems. Identification of threats enables the organization or university to take preemptive actions. During a threat identification, the whole team should be well documented, involved, and recorded. The team in the university or organization should be trained appropriately, and external research is done. The team in the organization conducting the identification should make use of the required software.
The organization or a university can perform threat identification by watching for attackers. This is done by sifting via log data to identify the actual attack patterns, which help give them an idea that is good on the types of attacks they require to worry about. Another step of identifying the threats in an organization or university is by meeting with its competitors. This is done by creating a threat community to prevent the exchange of good information threats in the groups. Every threat should be planned because it helps the organizations or schools be safe (Meloy, Mohandie, Knoll, & Hoffmann, 2015).
Discuss some of the cryptosystems that have been used to secure email. In your opinion, what are some of the biggest challenges in securing Web activity? Why?
A cryptosystem is a system of cryptography which employs cryptography. Cryptosystem helps implement the cryptographic methods and the management in providing the information security facilities to the user. The cryptosystems are used in sending data in a manner that is secured over the internet. The cryptosystems employ different methods to focus on the methods of encrypting. The PGP and TLS are the two standard encryption techniques used to provide secure communication by email.
Some of the biggest problems in securing web actions include data breaches where the cost of data breaches is adequately documented, led by negotiated credentials. The second problem is a malware infection, mostly recognized by most organizations on some security level threat that it brings in malware attacks. The third challenge is code injection, whereby hackers’ capabilities end up in the exploitation of vulnerabilities in the applications of inserting malicious code. These are some of the biggest problems in securing web actions because they threaten web security (Hugh Murray, 2015).
References
Hugh Murray, W. (2015). Common system design flaws and security issues. Information Security Management Handbook, Four Volume Set. doi:10.1201/9780203325438.ch153
Meloy, J. R., Mohandie, K., Knoll, J. L., & Hoffmann, J. (2015). The concept of identification in threat assessment. Behavioral Sciences & the Law, 33(2-3), 213-237. doi:10.1002/BSL.2166