Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Topic 1: Advanced and Persistent Threats

One of the biggest risks that companies face is advanced persistent threats. Discuss the most effective way to implement policies that mitigate the chance of an insider either taking part in or facilitating an advanced persistent threat.

What policies can help manage the insider threat for an organization's supply-chain companies, or the organization's off-shore contractors?


Integrate the concept of separation of duties into your discussion.

Topic 2: Mandiant Report

On Feb. 19, 2013 Mandiant released a report alleging that a specific Chinese military unit is behind one of the largest cyber espionage and attack campaigns aimed at American infrastructure and corporations. Public understanding of Advanced Persistent Threats (APT) is weak, attribution remains difficult, and cyberattacks are often dismissed as criminal or peripheral to national security. This carefully-researched report is significant because it convincingly and publicly assigns attribution for ongoing cyber espionage to groups supported by China. By publishing, Mandiant hopes that -

(a) this report will lead to increased understanding and coordinated action in countering APT network breaches; and

(b) its resulting exposure and discussion may thwart APT activities.

Discuss whether Mandiant's two desired outcomes above are likely to occur.

Topic 3: EMP and Solar Weather

While the daily news contains a wealth of information about vulnerabilities, threats, and hackers, there are still several national cybersecurity concerns about which little is known by the general public. Electromagnetic pulse (EMP) is described by several experts as a low-probability, high-effect event. First, read the journal article by Dan Dickerson: "No Defense: America's Growing Vulnerability to an EMP Attack." Another low-probability, high-effect threat are "Coronal Mass Ejections, more commonly known as Solar Flares. Our own sun goes through an eleven-year Sun Spot cycle, with the next maximum Solar Flare activity predicted to occur between 2013-2014. An "EMP" spike, or either a "Coronal Mass Ejection" magnetic field, can each disrupt or permanently disable power lines and computer circuitry. They can each fry transformers or overheat transistors. When an EMP event, or a Solar Flare, involves enough high energy, the resulting damage to electronic equipment may be so severe that a re-boot or re-start may not be possible. The equipment is trashed. The DOD, and possibly other countries are currently studying design for new energy weapons that can direct EMP against enemy computers.

After reading the EMP article, discuss with your classmates your opinion about the likelihood of an EMP attack by an adversary, or the likelihood of a Solar Flare that could permanently damage much of our sensitive electronic infrastructure equipment.

Answer these questions:

(1) to what degree should US policy makers should be concerned about a high-effect, low-probability EMP attack, or a powerful Solar Weather event?
(2) describe measures that may mitigate damage to the US power grid; and
(3) measures individuals can take to mitigate the consequences to their personal electronic equipment.


Topic 4: Penetration Testing & Vulnerability Assessments

As new technology becomes adopted by organizations, standards must also adapt to meet the change. What new standards should be adopted for penetration testing to assess vulnerability for mobile devices in the growing BYOD (Bring Your Own Device to work) environment?

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91230301

Have any Question?


Related Questions in Computer Engineering

Question steve jobs was a strong charismatic leader who

Question: Steve Jobs was a strong, charismatic leader who co-founded Apple and is credited with much of the success of the company. Some believe that Tim Cook, who became CEO in 2011, embraces a more collaborative leader ...

Question suppose that in game of chance you bet an initial

Question : Suppose that in game of chance, you bet an initial amount of money, and every time you play, the money is doubled with probability p and halved with probability 1 - p. (a) What value of p gives you an expected ...

Why is a secure random number different than a

Why is a secure random number different than a statistically random number in security and if it weren't securely random everything that it could impact. For example, think of everywhere that we rely on them being secure ...

Mary kate is a project manager in the it department for a

Mary Kate is a project manager in the IT department for a university. She has been asked to manage a project to create faculty intranet. The university has multiple campuses in various locations, and professors and other ...

Describe how to discover cookies on web browsers what is a

Describe how to discover cookies on web browsers. what is a reverse DNS lookup and can it be used when attacking the network.

Question interface design guidelines please respond to the

Question: "Interface Design Guidelines" Please respond to the following: • Imagine you are leading a team of designers for a new software product. During the kickoff meeting, the team starts to discuss design guidelines. ...

Costs are rising for all kinds of medical care the mean

Costs are rising for all kinds of medical care. The mean monthly rent at assisted living facilities was reported to have increased 27% over the last five years to $3886 (the wall street journal, October 27, 2012. aussume ...

Sorting algorithms are one kind of algorithm whose

Sorting algorithms are one kind of algorithm whose performance may depend upon the data. Choose one of the sorting algorithms or any other algorithm and explain whether the there are any differences in the best, average ...

Answer the following question how do you represent a node

Answer the following Question : How do you represent a node in a deployment diagram? What kinds of information can appear on a node? The response must be typed, single spaced, must be in times new roman font (size 12) an ...

Question how can the security vulnerabilities common with

Question : How can the security vulnerabilities common with wireless networking be handled to mitigate the risks? The response must be typed, single spaced, must be in times new roman font (size 12) and must follow the A ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As