DBR Case Study

1370 Words3 Pages

In its current innovative state, DBR has several areas of risk and concern. First and foremost is the propensity for intellectual property loss with focus on both internal and external factors. The human factor serves as the primary threat in these situations, and internally the company faces leaks, extortion, bribery, blackmail, and conspiracy among other types of attacks. DBR also needs to comprehend the external human factor, hacktivists, social engineers, competitors, and others who have a vested interest in the design and technology.

Secondarily, hardware and software vulnerabilities pose the next greatest threat in this infrastructure. Network segregation is of the utmost importance when protecting intellectual property. Sensitive data …show more content…

If an employee doesn’t understand the level of data sensitivity, they may freely offer it to anyone who asks. In addition, the courier who retrieves the tapes for delivery to the data-warehouse may be blindly overlooked and never challenged to identify themselves.

Hardware and software vulnerabilities, malware, viruses, improper logging, and patches all increase the attack vector of a company, often leaving it in a susceptible and vulnerable state. Commonly known weaknesses/vulnerabilities are preyed upon and are those that are typically checked first by an attacker. These unmanaged states leave the company exposed to various types of attacks which typically lead to intellectual property loss and even to an Advanced Persistent Threat (APT).

The human factor poses the most risk to DBR and applies to many areas of the infrastructure, for example; any lack of physical and logical access controls, data loss prevention, segregation of duties, social engineering, and employee security awareness training can, and will, wreak havoc when least …show more content…

It is clear that their primary concern is to protect their intellectual property. In order to align with the priority, a review of any and all security documentation, including but not limited to policies & procedures, plans (password, compliance, audit, risk, disaster recovery, incident response), and training. And based on the findings, provide recommendations for best practice and policy improvements where applicable. Network and architecture diagrams are necessary to understanding the infrastructure and identifying where the deficits

Open Document