1,752
26
Research Paper, 2 pages (300 words)

Example of research paper on assymmetric threats

An asymmetric threat is defined in military terms to refer to strategies and tactics that are utilized by a weaker opponent to take advantage of the vulnerabilities in the stronger opponents. For example inferior military that cannot face the US military in open combat employ strategies that render the US military might irrelevant. In terms of business operations and information security, it refers to an attack initiated by an adversary towards a business entity. Asymmetric threats are characterized by three scenarios: it must involve a tactic, strategy or exploit that an adversary could utilize against an organization. Second, it must include a tactic or exploit that the organization is not able to use against the adversary and finally, it must involve an exploit, strategy and tactic which if not countered could lead to serious consequences.
Asymmetric attacks can be prevented by employing comprehensive risk mitigation strategies. The use of conventional technology based controls is ineffective because it involve the pooling of massive resources that greatly outpace those of adversaries. An SQL Injection attack can be initialized within a few seconds of typing on the keyboard while the company protecting against SQL Injection attacks must use millions of money to purchase web applications.
Attacks such as denial of service can be prevented through implementation of security measures such as disabling unneeded networks, enabling quota systems, use of redundant and fault-tolerant network configurations as well as appropriate password policies.
Organizations face the problem of defending against constant asymmetric attacks based on past attacks. However asymmetric attackers are increasingly creative and motivated and change their ways often. Therefore, the defensive mechanism is limited and ineffective. Constant training of the security personnel is crucial as well as development of sound response mechanisms in addition to conventional security apparatus.

References

Brian Caswell, J. B. (2008). Snort 2. 1 Intrusion Detection, Second Edition. Syngress.
Kramer, F. S. (2009). Cyberpower and national security. Springer.
Nye, J. S. (2008, Decenber). Cyber insecurity. Project Sindicate .

Thank's for Your Vote!
Example of research paper on assymmetric threats. Page 1
Example of research paper on assymmetric threats. Page 2
Example of research paper on assymmetric threats. Page 3

This work, titled "Example of research paper on assymmetric threats" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Research Paper

References

AssignBuster. (2022) 'Example of research paper on assymmetric threats'. 14 September.

Reference

AssignBuster. (2022, September 14). Example of research paper on assymmetric threats. Retrieved from https://assignbuster.com/example-of-research-paper-on-assymmetric-threats/

References

AssignBuster. 2022. "Example of research paper on assymmetric threats." September 14, 2022. https://assignbuster.com/example-of-research-paper-on-assymmetric-threats/.

1. AssignBuster. "Example of research paper on assymmetric threats." September 14, 2022. https://assignbuster.com/example-of-research-paper-on-assymmetric-threats/.


Bibliography


AssignBuster. "Example of research paper on assymmetric threats." September 14, 2022. https://assignbuster.com/example-of-research-paper-on-assymmetric-threats/.

Work Cited

"Example of research paper on assymmetric threats." AssignBuster, 14 Sept. 2022, assignbuster.com/example-of-research-paper-on-assymmetric-threats/.

Get in Touch

Please, let us know if you have any ideas on improving Example of research paper on assymmetric threats, or our service. We will be happy to hear what you think: [email protected]