- Home
- Free Samples
- Operations management
- Threats Categories And Control Measures
Threats categories and Control Measures

For the following Threat Categories, describe which type of Control should be put in place in an organisation. Classify the controls as Administrative, Product or Physical, as well as whether the controls will Prevent, Detect, Correct or Compensate.
Threat Categories
• Accidental corruption of information • Loss of intellectual property • Software piracy • Theft of information (hacker) • Theft of information (employee) • Web site defacement • Theft of equipment • Viruses, worms, Trojan horses • Elevation of privilege • Fire/Flood
Answer
Answer:
Threat categories | Control | Description | Classification | Type |
Accidental corruption of information | Proper shutdown the system | To protect the accidental corruption of information we should proper shutdown the system. | administrative | Prevent |
Secure your wireless router | Protect the wireless router using the proper secure password. | administrative | prevent | |
Mask the data | We can mask the data by the masking techniques. The another name of data masking is data obsfucation. | administrative | prevent | |
Loss of intellectual property | Secure the system | To prevent the intellectual property from the system we can protect it by using the some hashing and password techniques. | administrative | Prevent |
Improve employee awareness | We can improve the employee awareness, it means give proper training to security of property | administrative | Prevent/detect | |
Identify IP and give access to the right people | We will identify our IP and will protect it from the unauthorized access. | administrative | Protect/prevent | |
Software piracy | Beef-up software license agreement | We should always prioritize our license agreement | Administrative | Prevent |
Include the evidence gathering technology | We will embed the technology in the software which will collect the information regarding registration and login, trial version. | administrative | Prevent/detect | |
Our policing effort should be timely | Statutes of limitations may prevent you from recovering for unauthorized use if a few years have passed since the incident occurred, especially if you knew of the incident and did not act. | administrative | prevent | |
Theft of information (hacker) | Don’t download any software | We should try to avoid the downloading from the any suspicious websites. | administartive | Prevent |
Use anti-virus | We should any anti-virus which is provided by the any company | product | prevent | |
Update os and software | We should regular update the os and softwares | Administrative | prevent | |
Website defacement | WebOrion | It provides the visual change, content and integrity monitoring. | Product | Detect |
Monitis | Cloud based monitoring platform offers blacklist and defacement monitioring | product | detect | |
IPVtec | It is also cloud based and proactively search the anomalies | product | Prevent/detect | |
Theft of equipment | Use hidden places | We should search the hidden and protective places to keep the equipments | Administrative | Physical |
Use the lock system | We should try to keep the equipment in lock. | physical | prevent | |
theftguard | We should use the theftguard to protect the equipment | administrative | prevent | |
Viruses, worms, Trojan horses | antivirus | We should use the antivirus which will protect from the malicious programs | product | Prevent |
Pop-up scripts | We will use the pop-up scripts which protect the application. | product | Detect/prevent | |
update os and softwares | We should update our os and softwares from regular interval | protect | prevent | |
Elevation of privilege | Tamper-Proofing Cookies | if you want to send data back to the client-side and be sure it hasn’t been tampered with when it returns, you need to digitally sign the data. | Administrative | Prevent |
Keep critical information on the server side | We will keep the important data on the sever side and will only send the session ID’s | Administrative | prevent | |
Use digital keys | For the access to the any information we will provide the digital signature keys. | administrative | prevent | |
Fire/Flood | Robust, high quality firewalls | We should uses the high quality firewalls to protect the records. | Product | prevent |
Keep the data in cloud | This is the best to protect the data form any kind of natural calamity | product | prevent | |
use external drive | Store the data in the external drive | product | prevent |

Customer Testimonials
ABC Assignment Help for one reason became my favorite because they don’t have a very complex signing up process and it’s very simple so everybody can use it. I was able to sign in without any hassle as my Company Law Assignment was due and they did it for me in a very efficient manner and I am very delighted with their service and a heartiest thanks.
Emily, Sydney
I work part time to meet my expenses apart from college and I took this as a decision to not burden my parents. A while later I started feeling great amount of stress in balancing it all together and decided to seek help from ABC Assignment Help for my Commercial Law Assignment and they did my assignment for me and I am super satisfied with their work style. Thank you so much.
Lawrence, Tasmania
I had a harsh week as I was extremely debilitated and every one of my assignments were getting excessively and caused me an incredible mental breakdown. A companion of mine seeing my circumstance asked me to utilize ABC Assignment encourage, their quick and efficient administrations helped me complete my Contract Law Assignment with less stress
Rihana, New South Wales