CIS142_4.9_Project_Part_3_Threats_and_Mitigation_Corey_Adams

docx

School

ECPI University, Greensboro *

*We aren’t endorsed by this school

Course

142

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

4

Uploaded by corada5995

Report
Threats and Mitigation SAAS Corey Adams | CIS142 | 8/18/2022
Software as a Service is vulnerable to many types of attacks. Amazon is limited in its resources so it cannot guarantee security. SaaS is susceptible to many of the same threats we all encounter every single day. Phishing, physical hacking/intrusion and other threats are just a few of the many that we encounter in our daily computer use. Although these threats are quite common, they can result in loss of work and even company shutdowns. We have been trained in Phishing. Avoid opening suspicious emails and avoiding links from unknown origin. There are many people out there trying to steal company information. It is incredible how many things can be embedded within emails and provided hidden hyperlinks. Untrained targets make it extremely difficult to avoid phishing. Regular training is a great way to ensure that you are well-prepared for these tactics. Even though physical hacking/intrusions may seem rare, they are quite common. They could be carrying ladders in the building to claim maintenance. IT sends support to inspect hardware. This could happen when someone claims that they forgot their badge but asks for your help to open it. A company could lose everything if employees forget to lock their doors after they use the restroom. If you spot something, let us know. To prevent this from happening, businesses have several identification procedures. Power outages could cause inconveniences and/or serious delays, as well as loss of work/progress. Normal circumstances will usually protect equipment. It is possible that surge protectors might need to be replaced depending upon the nature of the outage. However, data loss can be frustrating. While it is a good idea to save data as you go, it can happen that PAGE 1
data becomes corrupted, particularly if the SaaS provider goes down. These outages can often be avoided by using surge protectors or emergency generators. All businesses face serious problems from zero-day attacks. After malicious actors have discovered an issue, monitoring securities might not detect it immediately. A zero-day vulnerability can typically be enough to take out a business. Businesses can lose millions in customers. Businesses make every effort to minimize these threats by hiring capable people to evaluate their defenses. The objective is to catch the exploiter before they do. The majority of internal leakages involve employees who are unhappy and leave the company to go work for another company. Employees then use the knowledge and skills that they have gained and pass it on to their competitor. The voluntary sharing of secrets and other practices from previous companies is now possible. Most large-scale companies deter this with the contracts signed by their employees/developers. Even if they've left the company under Nondisclosure agreements, they could still be responsible for contract obligations. PAGE 2
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
References Jay, A. (n.d.). 10 SaaS Security Risks And Concerns Every User Has . Retrieved from FinancesOnline: https://financesonline.com/10- saas-security-risks-concerns-every-user/ PAGE 3