Monday, December 30, 2019

Psychological Assessment And Ethics Of Forensic Psychology

Psychological Assessment and Ethics Debra Deering FO611 Ethics and Professional Issues in Forensic Psychology Professor Cathy Donnell February 8, 2015 Abstract The purpose of this paper is to discuss the Million Clinical Multiaxial Inventory III. Information to be included in this paper will detail why this psychological assessment is used, how it is administered ethically, how it is scored, why it is unique, what precautions need to be taken to assure its ethical use, and any ethical concerns there are with this specific assessment tool. MILLION CLINICAL MULTIAXIAL INVENTORY III Identify the Assessment Tool and describe what it is used for The Million Clinical Multiaxial Inventory III is a 175 question test based on true or false answers. It is administered in clinical settings to clients with coping and or suspected mental health issues. The purpose of this assessment tool is to assist clinicians in diagnosing mental illness and in developing appropriate treatment plans. The MCMI III will also help with treatment decisions made by clinical staff based on patterns found in personality. This test was created to discover specific Axis I (schizophrenia, depression, bipolar disorder, PTSD, ADHD, anxiety disorders, etc.) and Axis II disorders (borderline, narcissistic and antisocial personality disorders). With the help of the clinician interview, the MCMI III is a highly regarded tool for discovering some 24 personality disorders and clinicalShow MoreRelatedForensic Psychology And The Human Mind And Its Functions1627 Words   |  7 PagesPsychology and law at first glance are not two terms that seem to correspond with each other. One might even question why they would be mentioned in the same context. Crime has become a major issue within today’s society. It seems as though the only way to prevent most of them is to enforce the repercussions of the act and punish those that partake in it. Criminals often have motives or attributes that lead them into a life of crime. Forensic psychology is the cynosure that brings the associationRead More Conflict Between Therapeutic and Forensic Roles of Psychologists1407 Words   |  6 PagesAbstract The Ethical Principles and Code of Conduct, published by the American Psychological Association are the standard guidelines for all Psychologists. Forensic Psychologists are also informed by Specialty Guidelines for Forensic Psychologist. Psychologists practicing forensic psychology can use these two documents to help clarify ethical questions. This paper will focus on role conflicts specifically in the area of Sex Offender Management and the ethical conflicts that may arise as a resultRead MoreDiversity and Multicultural Competence815 Words   |  3 PagesInterpersonal Effectiveness Diversity and Multicultural Competence Since Bobby is Hispanic, comes from a poor upbringing, did not finish his education, and is unable to hold a job as an adult; treatment must be dealt with according to his ethics and culture. Information found under the APA Guidelines, Policy Statements, and Resolutions the discussion of proper procedure in ethnic background treatment and diversity (APA, 2010). The recommendation of a Hispanic psychologist will only assist in allowingRead MoreThe Ethical Dilemma of Playing Both a Therapeutic and a Forensic Role: the Difference3154 Words   |  13 PagesThe Ethical Dilemma of Playing both a Therapeutic and a Forensic Role: The difference Amal Long-Labaar Argosy University Professional amp; Ethical Issues in Forensic Psych FP6500 Dr. Andria Hernandez April 20, 2013 Abstract There are specific differences between forensic psychologists and counseling psychologists/therapists. Not just the obvious differences such as the forensic psychologist being retained by the courts, prosecution, or defense, and the counseling psychologist performingRead MoreThe Ethical Principles Of Psychologists And Code Of Conduct999 Words   |  4 Pagesprovide appropriate education in their curriculum (e.g. practicum or internship) in forensic psychology. Therefore, as they obtain a career in this area they lack competency regarding the Code of Ethics, as well as other guidelines which can create ethical dilemmas in the future (Knapp VadeCreek, 2001). Additionally, these individuals lack competency regarding the roles of the forensic psychologist. The role of a forensic psychologist is to function as an expert witness by the means of conducting evaluationsRead MorePsychology : Psychology And Psychology1630 Words   |  7 PagesPsychology is a very broad field of study and r equires a lot of research when choosing a career. The education that is required for pursuing a career in the field of psychology depends on the type of psychologist you want to be. Most psychology programs require at least a master s degree to pursue a psychologist career, but some may require a doctoral degree. It is important to know the educational requirements as well as state requirements when entering the field of psychology. Southwestern hasRead MorePsychology : The Best Practice For A Forensic Psychologist1797 Words   |  8 Pagesare many different aspects of psychology, all mental health specialists have the same goal in mind and that is to provide assistance to those suffering from mental illness through service, advocacy, and education. Therefore, forensic psychologists are no longer the only mental health professional acting as an expert witness in court. Therapeutic psychologists are being called to testify, although most therapeutic psychologist try to stay out of t he courtroom due to ethics and not wanting to engage inRead MoreLegal Issues Associated With Clinical Psychology842 Words   |  3 Pages1. What are at least two legal issues associated with clinical psychology? What impact do these issues have on the field of clinical psychology? Psychological testing in the workplace is a legal issue that is associated with clinical psychology. The information gathered from psychological testing can be used against the candidate. Confidentiality issues are in conflict when the legal requirements of a court contradict the Ethics Code of the APA (Plante, 2005). As a result, the candidate can sueRead MoreThe Ethics Code And New York State Professional Standards1580 Words   |  7 PagesAbstract A professional psychologist enters into the field of Psychology to help others improve their mental health circumstances. As a licensed professional psychologist, it will be easy to know who the client will be because the client will request a service, pay and consent form signed. Client cannot be easily defined as just a paying customer because a client encompasses so many other things. WHO IS THE CLIENT? Who is the Client? There should be an obvious answer, which will be the payingRead MoreEthics Code And New York State Professional Standards1471 Words   |  6 PagesA professional psychologist enters into the field of Psychology to help others improve their mental health circumstances. As a licensed professional psychologist, it will be easy to know who the client will because the client will request a service, pay and consent form signed. Client cannot be easily defined as just a paying customer because a client encompasses so many other things. WHO IS THE CLIENT? Who is the Client? There will be an obvious answer, which will be the paying client. This

Sunday, December 22, 2019

Financial Resources Available To The Government Due To

financial resources available to the government due to conduct a sale in some units owned and lead to the retreat of the responsibility the state budget for financing investments, and increase productivity the quantity and quality of the availability of better methods of management. Al-Laham, et al. (2009) studied the Development of Electronic Money and Its Impact on the Central Bank Role and Monetary Policy. This paper depends on analytical method at determining the impact of the development of electronic money in the different areas. Data variables such as monetary supply, exchange rates, the money multiplier, velocity of money and seignorage are consider. Results shows that e-money, as a network good, could become an important form of†¦show more content†¦Hence the recommendation suggested that the effects of monetary policy transmitted through the financial indicators of the firms which are large enough to notice. However the financial advisors are the policy makers and it required vigilant eye at the financial figures of different companies, in order to reform and cater the monetary policies. Din and Khawaja (1995) investigated the determinants of interest spread of the banking industry in Pakistan. by using cross section data model, data variables Concentration, Inelasticity, Liquidity, Market Share, Equity, Nonperforming Loans, Administrative cost, GDP growth, Inflation, Interest rate. Feasible Generalized Least Square (GLS) on pooled data technique has been used. Results shows that there is no evidence of interest spread which influence the performance factors of banking industry that also includes the other financial sectors example of which are DFI and investments funds that can serve as an alternate to banks for small savers, Mwenda and Mutoti (2009) investigates the effects of market-based financial sector reforms on the competitiveness and efficiency of commercial banks, and economic growth, in Zambia. By using the variables such as Macroeconomic per capita GDP and inflation. Further, by using anShow MoreRelatedThe Cost of Tuition Among Colleges and Universities in Highly Diversified and Indefinite926 Words   |  4 PagesThe cost of tuition among colleges and universities is highly diversified and indefinite. Students shouldn’t be financial problems that are associated with the high tuition cost for their education because it creates unnecessary stress and financial problems. The student’s primary concern should be their academic performance and learning. The tuition fee includes extracurricular expenses such as lifestyle amenities that may not be essential toward the student education yet they are still being chargedRead MoreA Comprehensive Annual Financial Report ( Cafr ) Accounting156 8 Words   |  7 Pagesrecognition in State and Local Government (SLG) accounting. There will also be discussions on the guidance of governmental fund expenditure recognition, and how it is used in state and local governments. Certainly, there are differences between the fund and the government-wide financial statements, but there are some similarities. Within the paper, it will include the purpose as well as the content of the financial statements. While explaining the government-wide financial statements, the preparationRead MoreFour Different Economic Systems and Which One I Think Best Suits South Africas Mixed Economy1448 Words   |  6 Pagesconditions. â€Å"A government is not need to ensure the whole society’s welll-being† Adman Smith. 2.LITERARY REVIEW OF THE FOUR ECONOMIC SYSTEMS 2.1. Traditional Economic System: The traditional economy is a system whereby the goods and and products created by the society are shaped by the customs, beliefs and tradition. It is one which is not very dynamic and there is none much of modification occurring . The individuals standards of living are static, they do not enjoy much financial or occupationalRead MoreEvaluation Of A Projects Sustainability1352 Words   |  6 Pagesproject achievements by the project’s 5 technical focus areas. The PIR 2000-2006 constantly assessed the risks of the following six categories to the project: a. Pilot projects will not be able to proceed because external financing is no longer available; b. CREIA (The Chinese Renewable Energy Industries Association) does not receive any direct subsidies from the UNDP/GEF Project and will not be economically sustainable after 5 years because of low income generating capacity; c. The implementingRead MoreProblems Within Education Today s Education Essay1728 Words   |  7 Pagesprob lem facing the American education system is the lack of financial support. One survey revealed that the most common thing to happen due to budget cuts is to increase the class size, which has been directly correlated with poorer academic achievement. The problems facing education are plentiful, most of which are grounded in financial woes. These effects can be devastating to the lives of the children it affects or society as a whole, due to the statistics correlating dropouts with higher crime ratesRead MoreInternal And External Triggers, Resistance For Organisational Change1373 Words   |  6 PagesInternal triggers To begin with internal triggers, it is happened in marketing, human resource, financial and operations. Take an example from Coca-cola to introduce human resources triggers, â€Å"The Coca-Cola Company today announced a new operating structure and the senior leaders for those businesses.† (Coca-cola company, 2013.) The change of senior manager or top management team are usually a factor in human resource. In this case, the different manager may have a different leadership style or bringRead MoreAnalysis Of The City And County Of Denver1142 Words   |  5 Pagesregion as its financial, cultural, service and transportation center. It was founded in 1858 by William H. Larimer after a gold discovery in the area, and has grown to a city of about 3 million people today. Major economic features include the state capital building, international airport, central business district, cultural facilities, and numerous professional sports teams (City and County of Denver, 2017b). The ci ty operates under a strong mayor and city council form of government, and is organizedRead MoreRomani The Second Largest Part Of The European Union Essay1002 Words   |  5 PagesThese towns are filled with monuments, galleries, tombs, and other exciting cultural and historical remains. There are very few natural resources that help to structure and support the imports and exports set up. Some of those natural resources are petroleum, timber, natural gas, coal, iron ore, salt, and arable land. Most of these resources are also available in the surrounding counties. Exports have been the main driver of the recent improvement in the current account balance. The growth of exportsRead MoreEssay about City of Smithville878 Words   |  4 PagesCITY OF SMITHVILLE EVALUATION Below you will find 18 performance measures that use information from the basic financial statements of the City of Smithville (also referred to as â€Å"The City†) as of December 31, 2011. These measures are classified by those that address financial position, financial performance, and financial capability. FINANCIAL POSITION INDICATORS Financial position can be calculated using unrestricted net assets, general fund budgetary fund balance, capital asset conditionRead MoreBusiness1651 Words   |  7 Pages(c) Lenders. Lenders are interested in information that enables them to determine whether their loans, and the interest attaching to them, will be paid when due.   (d) Suppliers and other trade creditors. Suppliers and other creditors are interested in information that enables them to determine whether amounts owing to them will be paid when due. Trade creditors are likely to be interested in an enterprise over a shorter period than lenders unless they are dependent upon the continuation of the enterprise

Saturday, December 14, 2019

Ethical System Table Free Essays

Directions: 1. Fill in brief definitions of each primary ethical theory. 2. We will write a custom essay sample on Ethical System Table or any similar topic only for you Order Now Identify alternate names or variations of each ethical system based on your reading of the text and supplemental materials. Match the real-world examples listed below with the corresponding systems. The first one has been completed for you in the table. a. I believe people should be able to eat sand if they like the taste of it. b. I believe that if sand is going to be eaten, it should be available for everyone to eat. c. I believe people should be able to eat sand because it is the right thing to do. . I believe people should be able to eat sand because it is good for one’s health. e. I believe people should be able to eat sand if they decide they want to, regardless of whether it is someone else’s sand. f. I believe people should be able to eat sand if they want to because they are free to make the decision themselves. g. I believe I will eat sand because it is the standard meal for my community. 3. Develop your own workplace example that fits with each system. Prese nt each workplace scenario in a substantial paragraph of approximately 40 words. Although the table field will expand to accommodate your workplace examples, you may list them at the end of the table; make a note in the table to see the attached examples, however, so your facilitator knows to look for scenarios below the table. 4. Format references according to APA standards and include them after the table. |Ethical Theory or |Brief Definition |Other Names for Theory |Real-world Example|Workplace Example | |System | | | | | Duty-based Ethics |Regardless of consequences, |Deontology, pluralism, |C |It is my duty to follow through with | | |certain moral principles are |moral rights, rights-based|I believe people |instructions my boss gives me, even if I | | |binding, focusing on duty rather | |should be able to |do not agree with the concept. It is my | | |than results or moral obligation |Categorical imperative |eat sand because |moral obligation to respect authority | | |over what the individual would | |it is the right |figures. | | |prefer to do (Trevino Nelson, |Golden rule |thing to do. | | | |2007, Ch. 4). | | | | | | | | | | |In ethics, deontological ethics, | | | | | |or deontology (Greek: deon meaning| | | | | |obligation or duty), is a theory | | | | | |holding that decisions should be | | | | | |made solely or primarily by | | | | | |considering one’s duties and the | | | | | |rights of others. Some systems are| | | | | |based on biblical or tenets from | | | | | |sacred. | | | | |Consequence-based |â€Å"†¦an ethical decision should |Consequentialist Theories |B | | |Ethics |maximize benefits to society and | |I believe that if |I know that we signed a contract for a big| | |minimize harms. What matters is |Utilitarianism |sand is going to |new client but we can’t announce it until | | |the net balance of good | |be eaten, it |next month. The benefits to morale of the | | |consequences over bad† (Trevino | |should be |company and employees outweigh the | | |Nelson, 2007, Ch. 4). | |available for |consequences of making an early | | | | |everyone to eat. |announcement. I should make the | | | | | |announcement. |Rights-based Ethics |Rights are considered to be |Contractarianism |A | | | |ethically correct and valid since |Social Contract |I believe people |Employees have the right to expect a safe | | |a large or ruling population | |should be able to |working environment since that is part of | | |endorses them (Ridley, 1998). | |eat sand if they |the social contract in modern America. | | | | |like the taste of | | | | | |it. | |Human Nature Ethics |Ethical values that are hard coded| |D | | | |into people as being part of the |â€Å"Common Courtesy† |I believe people |A co-worker has the need to switch shifts | | |human race. Natural tendencies | |should be able to |to care for a sick family member. If the | | |instead of man-made law for making| |eat sand because |other individual doesn’t have a pressing | | |decisions. | |it is good for |engagement it would be nice to switch the | | | | |one’s health. |shift and help them out. | | | | | | |Relativistic Ethics |Moral disagreements are caused by |Moral Relativism |F | | | |the fact that everyone in theory | |I believe people |Based on the position someone has in a | | |is right in their own way. |â€Å"When in Rome, do as the |should be able to |company it may not be appropriate for them| | |Individuals only have to be true |Romans do. |eat sand if they |to have visible piercings or tattoos when | | |to themselves and no one else. | |want to because |a more professional demeanor needs to be | | | | |they are free to |maintained. Others may be able to since it| | | | |make the decision |doesn’t affect their performance or the | | | | |themselves. |company image in their position. | | | | | | |Entitlement-based | | |E | | |Ethics | | |I believe people | | | | | |should be able to | | | | | |eat sand if they | | | | | |decide they want | | | | | |to, regardless of | | | | | |whether it is | | | | | |someone else’s | | | | | |sand. | |Virtue-based ethics | | | | | | |The virtue ethics approach focuses|Community ethics, |G |The quality control team in our company | | |more on the integrity of the moral|professional |I believe I will |has to carry food handlers and safety | | |actor than on the moral act |responsibility |eat sand because |cards. I should be able to trust that food| | |itself. In virtue ethics, |The Disclosure Rule |it is the standard|provided as sample meets the standards of | | |character is very much defined by | |meal for my |the guidelines that they accepted when | | |one’s community (Trevino Nelson,| |community. |getting that certification. | | |2007, Ch. 4). | | | | Reference Trevino, L. K. , Nelson, K. A. (2007). Managing business ethics: Straight talk about how to do it right (4th ed. ). Hoboken, NJ: Wiley. Ridley, Aaron. (1998). Beginning Bioethics. New York: St. Martin’s Press. How to cite Ethical System Table, Papers

Friday, December 6, 2019

Classification of security threat in system - Myassignmenthelp.Com

Question: Discuss about the Classification of security threat in the system. Answer: Risk Assessment Assessment of risk is a systematic process that evaluates the potential risks involved within an organization. It consists of overall processes and methods of identifying the present hazards in an existing system. The identification and estimation of the different levels of risks associated with a situation is a complex process and therefore, proper risk assessment plan is laid out before the process initiation (Von Solms Van Niekerk 2013). The risk assessment process is divided into a number of stages, which includes identification of the hazards, accessing the risks and putting all the control measures in place. Identification of the hazards includes analysis of all the possible threats present in the system. The next stage includes accessing the risk. This is needed in order to evaluate the probable effect of the identified risks into the system. After the risk has been identified in the system and the network, it is essential to put control measures in place, in order to mitigat e the identified risks. The control measures or precautions ensure that no data is lost from the system (OConnell, 2012). The online operations of the organization are subjected to a number of risks. The project associated with the risk assessment includes identification, analyzing and evaluation of the risk. Proper cyber security control must be ensured in order to eliminate the risk of attack into the system. The project aims at developing a secure network within the organization along with ensuring proper protection in the existing systems of the organization (Cherdantseva et al., 2016). The development of the IT risk assessment report deals with the development of a risk register for the identified risks (Jouini, Rabai Aissa, 2014). Risk Register SL.No Security Risks/Threats Description Likelihood Impact Priority 1. Threat Insider A deliberate risk of data loss due to the act of a threat insider ( Hartmann Steup, 2013) High Severe High 2. Phishing Infusing malicious links into the system through email spam ( Hong, 2012) High Severe High 3. Ransomware It is a type of malware that restricts the access to the computer system ( Pathak Nanded, 2016).) High Severe High 4. Threats from BYOD The employees working on their own mobile devices within the organization can be a source of data vulnerability in the system. Medium Severe High 5. Denial of Service Attack Jamming the internal network of the organization, so that the legitimate users cannot use the resources ( Wang et al., 2015) Low Very low Low 6. Brute Force attack Use of a specific software by a hacker in order to guess a password. However, it may take a considerable amount of time. Medium Medium Medium 7. Injection Attacks The database of the organization is controlled by an attacker through this attack Medium High High 8. Malware Attack Malicious software that can monitor all the operations of the system and transmit data into the system as well ( Khouzani, Sarkar Altman, 2012) High Severe High 9. Lack of Recovery Planning Lack of proper disaster recovery system can lead to the permanent loss of data Low Medium Low 10. Lack of proper cyber security policy Lack of proper security policies in the organization may lead to the various security risks within the organization Low Low Low The risks identified above are some of the most common risk that the organization Gigantic Corporation is exposed to. The risk matrix explains the impact of the identified risks and the likelihood of their occurrence within the organization. The priority of the risks is identified and a high priority risk indicates that the particular risk requires immediate attention. While the medium and low priority of the risk indicates that the particular risk can be attended in due time as well. Since the project is about development of a network and information system within the organization that is capable of detecting and eliminating the active threats of the system, it is very essential to eliminate the identified risk or mitigate these risks from creeping into the system. The risk mitigation strategies are to be defined and implemented properly in the system so as to eliminate the all the threats associated with the system. The different mitigation strategies include ensuring proper intrus ion detection system and use of antivirus in such system is necessary. There are mainly two types of attacks, active attack and passive attack. The passive attack in the systems is difficult to detect as it deals with the silent monitoring of the system in order to collect confidential information from the system. Active attack on the other hand is easier to detect for is more harmful to the system. The risk of threat insider can only be mitigated by limiting the use of confidential data of the organization only to some selected member of the organization. In this way, the data loss (if any) can be easily tracked and necessary actions can be taken against the member. The risk matrix mentions that the impact of the threat from an insider is sever and therefore, this risk should be mitigated as soon as possible. Phishing is a critical threat that can be mitigated only by installing proper intrusion detection system. Furthermore, all the employees should be properly trained about the proper and safe use of emails. E-mail is a major tool of phishing attack as the malicious links are forwarded to the victims through emails. If a user clicks on the link, the virus spreads into the entire system, leading to the loss of confidential and personal data from the system. However, the presence of a proper intrusion detection system might help in blocking such malicious emails. Ransomware attack is one the most dangerous and most common cybercrimes. In this attack, the attacker gets an access of all the important data present in a system or network and locks them. In turn, the attacker demands a ransom from the victim for unlocking the data. This risk can be mitigated by installing an up to date antivirus in the system (Brewer, 2016). This can detect and eliminate the presence of ransomware from the system. Impact of the ransomware is marked severe in the risk matrix, as this malware is capable of transferring from one system to all the other system connected over a common network, without human interference. Therefore, this risk should be dealt with as soon as possible. For this, it is mandatory to ensure that the antivirus software installed for each system of the Gigantic Corporation is working effectively or not. Furthermore, the option of automatic patches for the operating system should be ensured. It is the responsibility of the risk manager to limit the older operating system. Threats from BYOD can be easily mitigated by ensuring that proper antivirus protection is installed in every device. Firewall protection of the system should be turned on in order to detect the entry of any malicious particle into the system. This can however, be a source of deliberate threat as a threat insider and therefore, the impact of this threat is marked severe in the matrix. Denial of service attack is a less severe attack that can be easily mitigated by limiting the rate of traffic a network can withstand in a particular time limit (Bhuyan, Bhattacharyya Kalita, 2015). Furthermore, it does not lead to any data loss and therefore, it can be mitigated in due course. Similarly, the brute force attack can be mitigated by the use of a strong password that will be hard to guess (Raza et al., 2012). Injection attack on the other hand is a severe risk that needs a proper attention. This is a common attack that aims at gaining the confidential information of the system. This can be mitigated by prevention of the use of dynamic SQL. Furthermore, use of firewall in the system can reduce the risk of injection attack. It is utmost essential to use proper antivirus software for mitigation of the risk (Sharma, Johari Sarma, 2012). Malware attack is another severe attack and therefore needs a wide attention. The systems of the Gigantic Corporation are exposed to malware threat due to the use of un-patched systems and absence of proper antivirus in the system. Furthermore, malware can easily spread to different systems connected over a single network and therefore, it is essential to mitigate the risk at once. A proper intrusion detection system will help in detecting the entry of malware into the system. Use of firewall into the system is essential in order to mitigate the risk associated with the systems. However, even after ensuring proper risk mitigation strategies into the system, it becomes essential to ensure that the organization has a proper disaster recovery plan. This will help the organization in recovering all the important and the confidential data in case it is being compromised. A proper disaster recovery plan ensures that the catastrophic events do not destroy the company or its data (Wallace Webber, 2017). Protection mechanism There are many security risks associated with websites that are needed to be properly mitigated in order to ensure the normal operations of the website. The major security risks associated with a website includes hacking, virus attack and identity theft. These are the most common security threats associated with the operation of the websites. Hacking is a common method by which an attacker gains access to the website with an aim of stealing confidential data from the same. The confidential data includes the customers list of the company, passwords of the employees and financial information (Gharibi Shaabi, 2012). The gained information is generally used by the hacker for their own benefit, such as selling the information to the rival company in exchange of money. This might lead to the considerable loss of the company. Similar is the case for virus as well. Virus is a specialized code that is designed or written in order to cause damage to the system. This can be a key logger and or a software that is capable of stealing the users files. Virus is generally uploaded to a web server with the help of input forms or with the use of backdoors. This can cause various issues in the website, such as change of the contents of the website, so as to redirect the users to a malicious website. Another severe problem with the presence of virus is a website is that the same virus can be downloaded in the computer of the user. This can help the attacker in gaining access to the confidential information present in the system. Gigantic Corporation is exposed to this threat as well. Furthermore, virus can be easily transferred to the different system that are connected over a single network. Therefore, presence of virus in the website is a major risk, which requires proper protection mechanism in order to secure the websites data. Identity theft is another major risk associated with a particular website. This refers to a situation, where the identity of a person or user is compromised and used for carrying on various criminal activities. Websites generally posses an increasing threat of identity theft. Hackers for using ones personal information for identity fraud generally intercept this. These threats in the website can be mitigated by the ensuring proper protection measures such as use of firewalls, secure socket layer and standards adherence. Firewall application can be installed in a web server in order to check all the communication and traffic to and fro the server. This ensures that any foreign or malicious data packet is blocked from entering the system (Suh et al., 2014). The firewall ensures only the legitimate packets enter into the system. Secure socket layer is a commonly used method for preventing the identity theft. The use of HTTPS ensures that a secure connection is established between the client and the server. Proper encryption of any information sent between the client and the server ensures that no third person is able to decrypt the information (Zissis Lekkas, 2012). The website and the web server are needed to adhere with the standard security guidelines in order to prevent any outside attack (Vance, Siponen Pahnila, 2012). Use of a strong password in a server prevents it from being hacked. References Bhuyan, M. H., Bhattacharyya, D. K., Kalita, J. K. (2015). An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection.Pattern Recognition Letters,51, 1-7. Brewer, R. (2016). Ransomware attacks: detection, prevention and cure.Network Security,2016(9), 5-9. Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H., Stoddart, K. (2016). A review of cyber security risk assessment methods for SCADA systems.computers security,56, 1-27. Gharibi, W., Shaabi, M. (2012). Cyber threats in social networking websites.arXiv preprint arXiv:1202.2420. Hartmann, K., Steup, C. (2013, June). The vulnerability of UAVs to cyber attacks-An approach to the risk assessment. InCyber Conflict (CyCon), 2013 5th International Conference on(pp. 1-23). IEEE. Hong, J. (2012). The state of phishing attacks.Communications of the ACM,55(1), 74-81. Jouini, M., Rabai, L. B. A., Aissa, A. B. (2014). Classification of security threats in information systems.Procedia Computer Science,32, 489-496. Khouzani, M. H. R., Sarkar, S., Altman, E. (2012). Maximum damage malware attack in mobile wireless networks. IEEE/ACM Transactions on Networking (TON), 20(5), 1347-1360. OConnell, M. E. (2012). Cyber security without cyber war.Journal of Conflict and Security Law,17(2), 187-209. Pathak, D. P., Nanded, Y. M. (2016). A dangerous trend of cybercrime: ransomware growing challenge.International Journal of Advanced Research in Computer Engineering Technology (IJARCET) Volume,5. Raza, M., Iqbal, M., Sharif, M., Haider, W. (2012). A survey of password attacks and comparative analysis on methods for secure authentication.World Applied Sciences Journal,19(4), 439-444. Sharma, P., Johari, R., Sarma, S. S. (2012). Integrated approach to prevent SQL injection attack and reflected cross site scripting attack.International Journal of System Assurance Engineering and Management,3(4), 343-351. Suh, M., Park, S. H., Lee, B., Yang, S. (2014, February). Building firewall over the software-defined network controller. InAdvanced Communication Technology (ICACT), 2014 16th International Conference on(pp. 744-748). IEEE. Vance, A., Siponen, M., Pahnila, S. (2012). Motivating IS security compliance: insights from habit and protection motivation theory. Information Management, 49(3), 190-198. Von Solms, R., Van Niekerk, J. (2013). From information security to cyber security.computers security,38, 97-102. Wallace, M., Webber, L. (2017).The disaster recovery handbook: A step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets. AMACOM Div American Mgmt Assn. Wang, B., Zheng, Y., Lou, W., Hou, Y. T. (2015). DDoS attack protection in the era of cloud computing and software-defined networking.Computer Networks,81, 308-319. Zissis, D., Lekkas, D. (2012). Addressing cloud computing security issues.Future Generation computer systems,28(3), 583-592.