Exercise: K2 Network K2 Network operates online game sites used by about 16 million people in over 100 countries. Players are allowed to enter a game for free, but must buy digital “assets” from K2, such as swords to fight dragons, if they want to be deeply involved. The games can accommodate millions of players at once and are played simultaneously by people all over the world. Prepare a security analysis for this Internet-based business. Copy the following quesons and respond by wring, at a minimum, one or two well-developed paragraphs for each queson. Be sure to cite the text to support your responses by integrang evidence through quotaons, paraphrases, or summaries. 1. What kinds of threats should it ancipate? K2 Network is an online game site network should expect online threats. The chapter 4.2 discusses threats such as being hacked by hackers, viruses, irresponsible insiders, social engineering, dumpster diving, phishing, and more. Since hackers are movated by profit or just for the challenge it is always to be expected hackers will aempt for one reason or another. On page 103, the text describes how hackers don’t have to physically be on site. This can be done remotely, or by drive by hacking, where an aacker accesses a wireless computer network, intercepts data, uses network services and/or sends aack instrucons without entering the office or organizaon that owns the network. 2. What would be their impact on the business? In the event one of the threats were successful in a breach, the impact on K2 Network business could potenally put them out of business. On page 109 the chapter shares that hacker can obtain elevated access called privilege escalaon, which may allow them to conduct illegal acons by deleng data or performing unauthorized acons. This could discourage and deter current and potenal customers from using K2 Network. 3. What steps can it take to prevent damage to its Web sites and connuing operaons? There are many steps K2 Network can take to prevent damage to its network. The text describes the organizaons employees are insiders and are the first line of defense training and educang employees about fishing emails, proper disposal of trash, changing passwords, pharming, keeping soſtware up to date, and doing everything they can to prevent and resist the ancipated threats. Page 107 says technology is the second line of defense from malicious agents. These agents are spammers that farm email addresses off websites or deposit spyware machines. They can incorporate authencaon and authorizaon measures in place for its employees via passwords, smartcard or tokens, and fingerprints and signatures authencaons prior to gaining access.