Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

DFSC 5325 Organizational System Security

Questions

1. What is the definition of Security Accountability? Make sure to briefly explain the security goals and requirements. 

2. Answer the following questions about accountability in an organization.

a) What is a basic rule to minimize the potential risk as far as collecting information from consumers is concerned?

b) What is the main responsibility of an Information Security Officer (ISO)?

c) What are some of the challenges that an ISO may be facing in a corporation?

3. Which act aims to protect the privacy of consumers' personal financial information? According to this act, are consumers made aware of the privacy policies that financial institutions follow? Are financial institutions allowed to disclose consumer's personal financial information to a nonaffiliated third party?

4. What is the counterpart of the GLB act in health systems? What is main purpose of this act?

5. The HIPPA security standard requires four key areas that the entities covered must address. Briefly discuss these four areas and especially discuss how security accountability can be implemented through compliance to the standard. In answering this question, you might want to link these area(s) to the security goals and requirements of Security Accountability.

6. Suppose you are involved in a project to design the security model for a very large company (e.g. an international investment bank) where there may be frequent changes to the company infrastructure (e.g. through merger or expansion) and users (e.g. due to hiring, firing, transfers, etc.), and you were given the instructions to increase productivity, lower the administrator's workload as well as the administrator to enduser ratio, which security access control model (MAC, DAC, or RBAC) would you use?

Justify your answer by discussing the pros and cons of each model, introduce the elements and relationships among elements of the model you prefer, and discuss why it will fit well in the above scenario. You should provide a detailed, thorough answer.

7. According to Michael Butler, the author of "Extending Role Based Access Control", what is the major drawback of RBAC when it comes down to implementation in operating systems?

8. Do some research to find out what protection mechanism is implemented by Fedora Linux that disallows executing code stored in the stack? Next, list a security feature implemented by the latest GCC compiler (Gnu C Compiler) and by the bash shell to prevent buffer overflow attacks. Why would such protection mechanisms be required?

9. Which statement in the C program "bufferVul.c" below has a buffer overflow vulnerability and why? Can you "patch" this vulnerability? Perhaps, it is a good idea to briefly go through Aleph One's "Smashing The Stack For Fun And Profit" .

//bufferVul.c
#include
#include
#include
int someFunction(char *str)
{
char buffer[12];
strcpy(buffer, str);
return 1;
}

10. Read about the return-to-libc attack and briefly describe how one might use the return-to-libc attack to obtain root privileges on a victim machine?

11. Almost everybody seems to agree that WEP has been "completely" broken and is consequently insecure. I'd like you to explain in very simple terms the implementation mistakes in the RC4 stream cipher used by WEP that led to this insecurity.

What can you tell me about the current state of security for WPA (TKIP) and WPA2 (CCMP/AES)? Which wireless encryption protocol do you use in your home network?

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M93104553

Have any Question?


Related Questions in Management Information System

Write 500 word response to the case belowcase study

Write 500 word response to the case below. Case study Statement and Tasks Refer to the textbook chapters 4, 5, 6, the attached handout "Network Attacker Document", and your findings from searching the internet about netw ...

Assignmentprepare a two-page briefing paper 5 to 7

Assignment Prepare a two-page briefing paper (5 to 7 paragraphs) for the senior leadership and corporate board of Red Clay Renovations which addresses planning (what do we need to do?), programming (how will we do it?), ...

Addressing and numbering please respond to the following

"Addressing and Numbering." Please respond to the following: • Discuss how you would develop an addressing and naming model in an environment that has 10 departments in a 1000 employee organization, are equally separated ...

Question why is a data language necessary for web

Question : Why is a data language necessary for web databases? What issues can arise with web database design? How secure are web databases from hackers? 275 words APA 2 sources

Question onesuppose the following mib for a certain

Question One Suppose the following MIB for a certain enterprise BikesFun selling bikes and t-shirts. Draw request-response messages, as shown in figures 6.40 and 6.41 (chapter 6), to retrieve all columnar objects of the ...

Read cybercrime deterrence and international legislation

Read "Cybercrime Deterrence and International Legislation: Evidence From Distributed Denial of Service Attacks," by Hui, Kim, and Wang, from MIS Quarterly (2017). Refer to this reading when completing Topic 8 DQ1. Read " ...

Suppose i am designing a personnel database for a

Suppose I am designing a personnel database for a university. The university has three types of personnel: students, staff, and faculty. Here are the characteristics of the three groups: -All three groups have a name and ...

Question how does a sequential control process differ from

Question : How does a sequential control process differ from a combination control process? Give one example each of a sequential control process and of a combination control process in which a PLC is used.

Discussion thinking about experience and goalswhat prior

Discussion : Thinking About Experience and Goals What prior experiences do you have that inform how you approach this class? This could be, for example, writing experience that you think will either help or hurt you as y ...

Ethics and information managementusing campbellsville

Ethics and Information Management Using Campbellsville University library and/or other sources, read at least four (4) academically reviewed articles on the ethical issues that may arise in information management. Please ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As