Activity 2: 172 mins
Activity 3: 54 mins
Proofread: 4 mins
Total: 299 mins
Weak password on troubleshooters account
If a stranger was able to get into a guides Critically Endangered account, they
would be able to make changes to the game to give them an unfair advantage to
other players. This dangerous because they could completely ruin a map, which
would lead to other guide users having to clear up the mess. To avoid this, the
organisation must make sure the employees are aware of cyber security rules to
make sure their password for their accounts is strong and stays out of anyone
else’s hands.
Critically Endangered’s servers being overloaded maliciously
If the servers for Critically Endangered were overloaded with requests, this
would make the servers inaccessible to players who want to play the game. This
would negatively affect the organisation because they would lose some of their
players due to them being unable to join a game. To avoid this, the servers for
Critically Endangered should have a cap to limit the number of requests it can
deal with at one time. This will make sure the servers don’t go down and the
game stay available to its players.
An unknown exploit that allows access too users personal information
If a vulnerability is found in Critically Endangered by malicious people, they
could upload a dangerous program onto the servers. This could lead to the virus
infecting people’s machines through the game. This is damaging for the
organisation because they would be a lot of angry people blaming the
organisation for their machines being damaged. To avoid this, they could hire
white hats or experienced hackers to try and break into the system. This will
determine whether the system is safe for users to use.
Alternatives
An alternative to teaching staff about cyber security rules is for the organisation
to choose the password for the accounts themselves. The passwords could be
given by to dedicated players to ensure the accounts are secure.
An alternative to having a limit on how many requests a server can deal with at
a time is limit the number of requests the same device can send. This will stop a
device sending hundreds of requests, therefore reducing the amount of work a
server has to do.
An alternative to hiring white hats is allowing access to a beta system for
Critically Endangered to the public. The beta system could be isolated on one
server that doesn’t allow any data to leave it. This will allow people to
thoroughly test the system and find any flaws in the system.
Rationale
I chose to teach staff about cyber security rules because once they know what
make a good password, they can apply that knowledge to secure their other
accounts, reducing them being beached.