Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask English Expert

Developing a secure information system

Actions for 'Developing a secure information system'

Subscribe Hide Description

Security attacks on information systems occur all the time and pertain to every aspect of the attacked system. In other words the attacks are directed against all components of a system. The attackers look for the weakest links in each component and using various tools exploit the potential vulnerabilities. The first step in establishing a secure information system is to consider the potential threats and the corresponding attacks. Next, the risk or the probability of a threat to cause damage to an asset should be evaluated. Once the threat definition and risk analysis are performed, the appropriate solution of defense can be devised.

The purpose of this conference topic is to understand the prerequisite steps that should be taken for a successful implementation of security solutions. Read through Session 4 Lecture Notes, and become familiar with the issues of vulnerabilities. attacks and countermeasures at different layers. We will focus on typical attacks in the Internet affecting confidentiality, integrity and availability mainly on the lower four layers: Layer 1, Physical; Layer 2, Data Link; Layer 3, Network; and Layer 4, Transport.

Assignment:

Post your personal viewpoint upon the following issues:

  • Your boss is asking each engineer from all departments to come up with the one or two sources of network threats and attacks you consider the most critical and why. He wants you to be able to fit your thoughts on an index card. He does not care if the same problem is addressed from several points of view or if you address a very specific "threat of the day" or one from the past that could come back. You are also asked to have an opinion about the potential risks of such threats and attacks.
  • With limited time and resources your manager wants everyone to suggest the structure of a network defense system to protect the computers and the network. Since this is an open discussion if your favorite idea has been discussed "to death" pick the next. These are pro-active steps. Consider at least two solutions and why one ranks high on your mind.

Hint: When describe typical attacks make reference to the corresponding layer and the controls that are employed in that layer to minimize the attack or vulnerability that leads to the attack. For example, in the link layer, there is ARP spoofing and man-in-the-middle attacks. In the IP layer, there is packet sniffing. In the transport layer, there is the SYN flood attack causing Denial of Service. Be as complete as possible and cite your reference materials in your response. We have not talked much about the physical layer. In physical layer, for example, an attacker can cut a cable or jam a wireless signal affecting availability or wiretap affecting confidentiality. You may need to dig up sources on the physical layer security.

English, Academics

  • Category:- English
  • Reference No.:- M92498197
  • Price:- $20

Priced at Now at $20, Verified Solution

Have any Question?


Related Questions in English

Question this week you will be changing gears and moving

Question: This week, you will be changing gears and moving from narrative writing to beginning on the informative paper. For this assignment, please review the directions for the Week 5 assignment and think of a topic yo ...

An octoroon - the art of dramatic composition a

An Octoroon - The Art Of Dramatic Composition: A Prologue Script Analysis: 1000 Words Use two other resources: Background information: May include: What is the play, who wrote it, when is it from, what style is it writte ...

Two question discussion 1 master-at-arms john claggart is

Two question discussion 1. Master-at-Arms John Claggart is presented in the novel as the embodiment of evil, but is he a believable character? Cite one or two quotations or specific scenes which demonstrate his evil, as ...

Writing assignment an analysis of william wylers film the

Writing Assignment: An Analysis of William Wyler's film, The Letter (1940) The Writing Assignment on William Wyler's film. N.B.: You can watch this film again by renting and streaming it on amazon.com for $2.99. Please t ...

Question the title is about effect of hot climate on

Question: The Title is about " Effect of hot climate on pavement performance" The paper should cover comprehensive materials related to the subject and should not reflect the opinion of a few authors. Materials should be ...

Assignmentthere have been more than a few newsworthy

Assignment There have been more than a few newsworthy failures to succeed relating to the implementation of enterprise resource planning systems (ERP) that resulted in lawsuits between companies and contracted solution p ...

Question select one of the following1there are several

Question: Select ONE of the following: 1. There are several different formats (emails, letters, reports, slides, and more) we will study this quarter. How important is the format in connecting with an audience? Defend yo ...

Question create a 5-paragraph self-reflection research

Question: Create a 5-paragraph self-reflection research essay of 500-750-words that includes: an introduction with a mapped thesis statement, three body paragraphs, and a conclusion. The following sub-topics should be th ...

Do some research and answer the following critical thinking

Do some research and answer the following critical thinking questions from this week's readings. In your analysis, cite a minimum of three (3) references from different sources (the textbook can be one source).Two busine ...

Question in accounting if information is to be useful it

Question: In accounting if information is to be useful it has to be trusted. Stakeholders rely on accurate, trustworthy information on which to base their decisions. The role that ethics plays in our study of accounting ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As