Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Nowadays, many organizations understand the need to protect their assets by impl

ID: 3815571 • Letter: N

Question

Nowadays, many organizations understand the need to protect their assets by implementing a security program. One of the first steps in implementing a security program is to perform a threat analysis. A threat analysis is a process in which an organization identifies and characterizes the threats attached to its assets. Perform a threat identification for the following scenario: You have been hired by a startup company that offers online 3D printing. Their business concept is easy to understand: The website has a single form, that allows a user to enter his information (including his address and credit card information), and to upload his 3D design. Upon reception of the form's data and after processing the payment, the company prints the design and delivers it to the indicated user's address. Because this is a young company, your colleagues run the unique server that hosts the web application in their garage. Because they are fresh out of college, they are not knowledgeable about security and haven't implemented any security controls yet. Please note that this scenario is not detailed. Please include in your response any assumption that you have used.

Explanation / Answer

As far as I am concerned, various cyber threats that may occur when don't take security practices in 3D printing are as follows:

1)There is possibility for the attacks that can have devastating impact on users of the end products.

2)With 3D printed components, such as metallic molds made for injection molding used in high temperature and pressure conditions, such defects may eventually cause failure

3)An attacker could hack into a printer that is connected to Internet to introduce internal defects as the component is being printed.

4)New cybersecurity methods and tools are required to protect critical parts from such compromise.