Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Real World Practices for Cyber Security Assignment

Question 1 -

Consider the following scenarios. Imagine that you are the in-charge of the security in each scenario. Explain how would you apply concepts of computer security to create a safer atmosphere by answering the questions below.

Scenarios

i. You are the in-charge of the Myki central sever at Melbourne.

ii. You manage the email server for a major election campaign.

iii. You are grading homework submissions for a class of 360+ students.

iv. You are the network administrator of the Melbourne Cricket Ground (MCG).

v. Yu run weekly Powerball Lottery in Australia.

Questions

a) What assets are important for you to protect?

b) What security threats will you choose to defend against?

c) What countermeasures can you justify, in terms of costs and benefits?

Answer each of the above questions in the form of a bulleted list for each scenario, with brief justifications, assumptions (if any) or explanations as necessary. Please state any assumptions you made. Your explanations for each part should be approximately a 200 words in length. State any critical assumptions you decide to make. Your grade will be based on the thoroughness, realism, and thoughtfulness of your analysis.

Question 2 -

Consider an automated teller machine (ATM) in which users provide a personal identification number (PIN) and a card for account access. Explain with examples of confidentiality, integrity, and availability requirements associated with the system and, in each case, indicate the degree of importance of the requirement.

Question 3 -

You may have heard about different types of malware which are bad and do harm your computers and network systems. You should investigate FOUR different types of malware listed answering the questions below. In that way you could protect your computers and computer systems.

i. Virus

ii. Worms

iii. Trojan horse

iv. Spyware

Investigate each malware listed using following question. Write a summary about each using your findings to each question.

i. What is it?

ii. How can you get it (What is the source)?

iii. Who is capable of developing it?

iv. What harm can it do to your computer?

v. How can you protect your computer from each malware?

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92452744
  • Price:- $50

Guranteed 36 Hours Delivery, In Price:- $50

Have any Question?


Related Questions in Computer Network & Security

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Question suppose public-key cryptography is used to encrypt

Question : Suppose public-key cryptography is used to encrypt the communications between Alice and Bob. Alice's public key is eA, private key is dA; Bob's public key is private key is de. Now Bob wants to send a message ...

Topic is impacts of data breaches the report will divide in

Topic is "Impacts of data breaches". the report will divide in to 5 section which is : "" 1-Abstract: comprehensive overview of the report in 150 to 200 words. 2- Introduction: Describe the topic and its issue in 250 to ...

Network project management assignment -purpose of the

Network Project Management Assignment - Purpose of the assessment - The purpose of this assignment is to build a clear understanding of project management fundamentals and their application, specifically: demonstrate pro ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Content analysis assignmentoverviewthis assignment has

Content Analysis Assignment Overview This assignment has three major aims: - To help students gain good understanding of all ITECH1102 theoretical and practical material. - To encourage students to use content analysis s ...

Sms use short message peer to peer smpp protocolimessage

SMS use Short Message Peer to Peer (SMPP) protocol IMessage based on Apple push notifications (APNS) - binary protocol WhatsApp uses standard Extensible Messaging and Presence Protocol (XMPP) Write a pragraph explaining ...

Question for the remaining questions consider a 4-bit block

Question : For the remaining questions, consider a 4-bit block cipher, described in hexadecimal by the following table: Plaintext Ciphertext Plaintext Ciphertext 0 a 8 e 1 c 9 d 2 f a 0 3 6 b 7 4 3 c 5 5 8 d b 6 4 e 9 7 ...

A certain device is used to determine the sex of an unborn

A certain device is used to determine the sex of an unborn baby, but the device is not very reliable. If the fetus is truly a boy, the device says BOY with probability 0:8 (but, mistakenly, GIRL with probability 0:2). If ...

It networking assignment -major lab scenario -assessment

IT Networking Assignment - Major Lab Scenario - Assessment Requirements: Subnet an address space with given requirements. Assign appropriate addresses to interfaces and document them in the address table. Build the netwo ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As