Analyse the various approaches for mitigating security risk

Assignment Help Computer Network Security
Reference no: EM131332667 , Length: word count:1250

Task

Specific issues that you need to address in the forum discussions are provided within the first 3 topics. These questions are posed for you to reflect on in the form of written Discussion Board (forum) posts. As this is a postgraduate course, it is expected that your written responses will provide you an opportunity to express your personal and professional views. There are no correct answers, however the way you justify your answers with validated evidence is key to this activity. Post your forum entries as you are prompted within the topics. Your Subject Co-ordinator will respond to your first forum post, and monitor and moderate as required the remaining 2 posts.

You must curate, collect and save your responses in a word document to be submitted on EASTs. This activity's final mark will be provided prior to the final assessment item. Rationale As this is a graduate course, more is expected from students in the way of participation, and further as a graduate reading course, the opinions of students are actively sought to demonstrate that the reading material has been read, understood and provoked a response.

The readings on a given topic will in general not agree on all issues in the topic, such as the role and feasibility of cyber-insurance, and soliciting written responses from students gives an opportunity for expressing opinions from the professional experience of each student. Also being a distance course, regular posting on the forum promotes the cohesion of the cohort and a notion of group learning for this course.

This assignment is for students to meet parts of the following learning outcomes. Be able to critically analyse the various approaches for mitigating security risk, including when to use insurance to transfer IT risk; be able to critically evaluate IT security risks in terms of vulnerabilities targeted by hackers and the benefits of using intrusion detection systems, firewalls and vulnerability scanners to reduce risk.

1250 words

7 references

References -

1. Asgharpour, F., Liu, D., & Camp, L. J. (2007). Mental models of security risks. In Financial cryptography and data security : lecture notes in computer science (pp. 367-377). Berlin ; New York : Springer.

2. Day, K. (2003). Inside the security mind : making the tough decisions. (329 pages). Upper Saddle River, N. J : Pearson Education.

3. Perception of Risk

Author(s): Paul Slovic

Source: Science, New Series, Vol. 236, No. 4799 (Apr. 17, 1987), pp. 280-285

Published by: American Association for the Advancement of Science

Stable URL: https://www.jstor.org/stable/1698637.

Reference no: EM131332667

Questions Cloud

Long-term Financing Needed-what is total long-term debt : At year-end 2013, Wallace Landscaping's total assets were $1.6 million and its accounts payable were $450,000. Sales, which in 2013 were $2.2 million, are expected to increase by 20% in 2014.  What was Wallace's total long-term debt in 2013?  What we..
Watch the meth epidemic frontline video on the pbs : Watch "The Meth Epidemic" Frontline video on the PBS website.Write using 1 to 3 References to address the following questions/sections regarding Meth:Introduction,What is Meth?How does Meth use affect the individual, everyday life, and their family?W..
List the types of the two players at each state of the world : List the types of the two players at each state of the world in Y.- Can the beliefs of the players be derived from a common prior? If so, what is that common prior? If not, justify your answer.
Examine book-value balance sheet for university products inc : Examine the following book-value balance sheet for University Products, Inc. What is the capital structure of the firm on the basis of market values?
Analyse the various approaches for mitigating security risk : This assignment is for students to meet parts of the following learning outcomes. Be able to critically analyse the various approaches for mitigating security risk, including when to use insurance to transfer IT risk
Write a report about psychological support framework : Create your own psychological support agency to respond to a national catastrophic event (Wildfire, Tornados, Water Shortage, Flood, Mass Shooting, etc.)Write a report using 3 to 5 References that details the psychological support framework of your..
Situation presented by a state of the world : Construct a belief space in which the described situation is represented by a state of the world and indicate that state.
Write a refelection paper about the given case : The student will research and review five selected case studies and reflection on the case. Reflection will include summary information, outcome information and discussion as to how this case impacts the study of comparative crime and justice poli..
Construct a belief space : Construct a belief space in which the described situation is represented by a state of the world and indicate that state.

Reviews

len1332667

12/29/2016 3:01:05 AM

Specific issues that you need to address in the forum discussions are provided within the first 3 topics. These questions are posed for you to reflect on in the form of written Discussion Board (forum) posts. The written responses for each topic will be reviewed and assessed by the Subject Coordinator. Students will be evaluated on: Regular participation in forum activities Understanding of the topic Use of supporting evidence Written expression Constructive engagement in conversations to build learning community topics are attached in pdf files and words to be dived equally for each topic.

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd