Describe devices or controls you know have been used

Assignment Help Theory of Computation
Reference no: EM132640566

Principle and Policy - Info Assurance

Answer the questions below and insure you justify ALL answers. Answers must be explained in your own words. Add references if appropriate.

Question 1. A noted computer security expert has said without integrity, no system can provide confidentiality. Do you agree? Can a system provide integrity without confidentiality?

Question 2. Some cryptographers believe security mechanisms other than cryptography are unnecessary because cryptography could provide any desired level of confidentiality and integrity. Ignoring availability, either justify or refute this belief.

Question 3. In security, both physical and cyber, there is a concept of Defense in Depth. Discuss this concept for physical security. You must protect a very sensitive location. Given the ideal situation of an unlimited budget to physically defend an organization, describe how you would go about protecting the facility (physically) as well as the network (physically) from a malicious actor or group gaining entry. List devices and controls you would put in place to protect the location. Describe why you think these might be necessary and how they protect the organization. Include everything you learned from chapter 7 of Security Programs and Policies.

Question 4. Describe devices or controls you know have been used in other organizations but you left out of question #3. Explain why you did not include them and why you think they are not needed.

Question 5. You are a Data Center manager. Your physical security measures were....inadequate...and hacktivist have broken into your data center and set it on fire. Discuss your thoughts. What type of fire suppression system should be in place? Do some research and figure out how often it should be inspected and tested; give me the information you found. Are there any special things that should have been accomplished long ago to help restore the business to operation again? Discuss.

Question 6. What is an SOP? Describe what chapter 8 of Security Programs and Policies says are important about them and should be done.

Question 7. What is Change Control and why is it important? Why is patch management normally handled differently?

Question 8. Discuss what the book Security Programs and Policies says about Service Provider contracts. Discuss what is meant by Due Diligence and include the importance of audits.

Question 9. In chapter 9 of Security Programs and Policies, the book talks about 3 types of Identity Verification. Describe what they are. There is another that is starting to be used, but the book did not discuss. It is Where You Are. Research this and see how it is being used and give your thoughts.

Question 10. You were just hired to be the Chief Information Security Officer for a very large organization. In your first week at work you find out the organization has a telework policy which allows employees to use personal computers from home to connect through the organizations VPN. Is this a good practice? Why or why not? As the CISO, are there any recommendations you would make to executive leadership? If so, what are they?

Question 11.Ransomware has become a major issue for individuals, businesses, governments, banks, hospitals, etc. Research and describe the ransomware incident which occurred in Texas in August 2019. Give your thoughts about what occurred. List what you found to be good and bad about the response.

Reference no: EM132640566

Questions Cloud

How do record the transactions in the t accounts : How do Record the transactions in the T accounts and provide the December 31 balance where appropriate. If required, round to one decimal place.
Recommend a specific therapy for the family : Summarize the key points of both structural family therapy and strategic family therapy. Recommend a specific therapy for the family, and justify your choice.
Emotional and cultural intelligence : Explain two potential ways the Alliah's leadership will improve their cultural intelligence by working with a more diverse group of stakeholders.
What are pros and cons for the different sampling strategies : Compare the sampling strategies for quantitative studies with qualitative studies. What are the pros and cons for the different sampling strategies?
Describe devices or controls you know have been used : Describe devices or controls you know have been used in other organizations but you left out of question #3. Explain why you did not include them
Give a theoretical analysis of fijian business accounting : Give a theoretical analysis of Fijian business accounting system for improved care for others and to identify issues in the further development of this field
Discuss a global implication of the disease : Discuss a global implication of the disease. How is this addressed in other countries or cultures? Is this disease endemic to a particular area?
Determine the downside deviation : Determine the Downside deviation. Given below is hypothetical data on two stocks on the Lusaka Stock. Excahnge and the market data
Define how health care delivery systems work collaboratively : Select a global health issue affecting the international health community. Briefly describe the global health issue and its impact on the larger public health.

Reviews

Write a Review

Theory of Computation Questions & Answers

  Finite-state machine design

Create a finite-state machine design to turn your FPGA development board into a simple programmable music box.

  Redundant sequence identi cation

Redundant sequence identi cation

  Compute a shortest superstring

Dynamic programming algorithm to compute a shortest superstring.

  Propositional and predicate logic

Write down a structural induction principle for the PlayTree free type

  Design a syntactic analyzer

Design a syntactic analyzer for the language specified by the grammar

  Design unambiguous grammar to parse expressions

Write a program would read two numbers and then print all numbers between the first and the second, inclusive. Design unambiguous grammar to parse expressions

  Consider a logic function with three outputs

Consider a logic function with three outputs,  A ,  B , and  C , and three inputs,  D ,  E , and  F . The function is defined as follows:  A  is true if at least one input is true,  B  is true

  Considering a single programmed operating system

Considering a single programmed operating system, what is the minimal total time required to complete executions of the two processes? You should explain your answer with a diagram.

  How to construct an nfa

Give a construction that assumes you are given a DFA for L and show how to construct an NFA (with or without ε-moves) to recognize sort(L).

  Equivalence classes to construct minimal dfa for language

How many equivalence classes does this relation have and what are they? Use these equivalence classes to construct the minimal DFA for the language.

  Impact of moore-s law on data center costs

Discuss the impact of Moore's law on data center costs on such things as servers and communications equipment. List at least 3 steps or recommendations your data center can take to offset some or all of the effect of Moore's law.

  Problem encountered in statements in predicate logic

How the problem would be encountered in attempting to represent the following statements in Predicate logic. it should be possible to: John only likes to see French movies.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd