OpenSSL mainly used for cryptography library which provides execution of SSL and TSL in opensource. As we all know that OpenSSL is used by around 60% of web servers present in the world. In current time information system security...
moreOpenSSL mainly used for cryptography library which provides execution of SSL and TSL in opensource. As we all know that OpenSSL is used by around 60% of web servers present in the world. In current time information system security implementation recommendation used to find out the threat or securities vulnerabilities on the basis of processes, users and infrastructure. Due to the presence of different types of threats, it is necessary to make different secure pieces of the information system. Due to the rise in complexity of IT system security the role of IT governance play a major role in the mechanism of IT governance. There are so many different IT frameworks nowadays mainly used to provide better and secure information system to the organizations. As we know that any framework of IT control framework is explained as “ A known system of control management which covers complete internal control of any organization. Normally there are three types of control framework according to the research of Nicho(2008). In this report, we will be analysis all the threats and analysis using diagrams and will be discussing how organization code of ethics and security policies does apply and what the security policies that organization should apply on their information system to mitigate the risks and important factors which can affect to your organization. Hackers create fake accounts in order to inflate clicks, likes, and shares on social media so as to manipulate the user to believe in a perception. Attackers usually use software to create a function to automatically spread malicious links. A kind of Operational threat that occurs when an entire system or a part of the system fails. Spyware as the name suggests spies on the user and collects account details such as username, passwords and sends it to the hackers. Use of Anti-Phishing tool can help a lot in mitigating this type of attack. Use of firewalls, keeping information masqued are some other preventive measures. Periodic system checkups must be performed so as to avoid system failures. Also, Errors must be clearly mitigated by personal alertness. The major concept behind the implementation of OpenSSL is to organize the information system security according to the needs of the users which going to fulfill the objectives of organization business. Whereas when data passes over the network then it will be sent over the SSL. Here in this report, we are going to discuss OpenSSL, its type, encryption algorithms, learn different way through which attacker exploit the network and how to deal with it.