Developing a secure information system

Assignment Help English
Reference no: EM131689500

Developing a secure information system

Actions for 'Developing a secure information system'

Subscribe Hide Description

Security attacks on information systems occur all the time and pertain to every aspect of the attacked system. In other words the attacks are directed against all components of a system. The attackers look for the weakest links in each component and using various tools exploit the potential vulnerabilities. The first step in establishing a secure information system is to consider the potential threats and the corresponding attacks. Next, the risk or the probability of a threat to cause damage to an asset should be evaluated. Once the threat definition and risk analysis are performed, the appropriate solution of defense can be devised.

The purpose of this conference topic is to understand the prerequisite steps that should be taken for a successful implementation of security solutions. Read through Session 4 Lecture Notes, and become familiar with the issues of vulnerabilities. attacks and countermeasures at different layers. We will focus on typical attacks in the Internet affecting confidentiality, integrity and availability mainly on the lower four layers: Layer 1, Physical; Layer 2, Data Link; Layer 3, Network; and Layer 4, Transport.

Assignment:

Post your personal viewpoint upon the following issues:

  • Your boss is asking each engineer from all departments to come up with the one or two sources of network threats and attacks you consider the most critical and why. He wants you to be able to fit your thoughts on an index card. He does not care if the same problem is addressed from several points of view or if you address a very specific "threat of the day" or one from the past that could come back. You are also asked to have an opinion about the potential risks of such threats and attacks.
  • With limited time and resources your manager wants everyone to suggest the structure of a network defense system to protect the computers and the network. Since this is an open discussion if your favorite idea has been discussed "to death" pick the next. These are pro-active steps. Consider at least two solutions and why one ranks high on your mind.

Hint: When describe typical attacks make reference to the corresponding layer and the controls that are employed in that layer to minimize the attack or vulnerability that leads to the attack. For example, in the link layer, there is ARP spoofing and man-in-the-middle attacks. In the IP layer, there is packet sniffing. In the transport layer, there is the SYN flood attack causing Denial of Service. Be as complete as possible and cite your reference materials in your response. We have not talked much about the physical layer. In physical layer, for example, an attacker can cut a cable or jam a wireless signal affecting availability or wiretap affecting confidentiality. You may need to dig up sources on the physical layer security.

Reference no: EM131689500

Questions Cloud

Define and apply the four steps of the marketing process : List and briefly describe the 4 P's of marketing, relating them to customer service.Define and apply the concept of brand image to an organization.
Facilitate governmental access to such data : To what degree should these companies facilitate governmental access to such data?
Estimate the proportion of households for telephone line : The telephone company wants to estimate the proportion of households that would purchase an additional telephone line if it were made available.
Define the different components of the application : Define the different components of the application (Default.aspx, Helper and Database Context) and explain the relation between them.
Developing a secure information system : Security attacks on information systems occur all the time and pertain to every aspect of the attacked system.
Statement of the goal or the change you want to make : Discuss why this goal or change is important to you and how it will help you improve your life
Find the domain and range : SIT194 - find the domain and range and find a restriction of the domain such that the function is one-to-one - Find the volume formed when the area above
What are your thoughts on the leaders response : What are your thoughts on the leader's response? How you could implement their thinking in your own career?
Research at least three relevant individual ob issues : Research at least three relevant individual OB issues to discuss at the conference

Reviews

Write a Review

English Questions & Answers

  Write an analysis paper about article this is our world

Write a critical analysis paper about the article "This is Our World" by Dorothy Allison.

  Explain how culture impacts how you communicate

Explain how culture impacts how you communicate with others, including those from different cultures - Define culture and explain why it is important to understanding communication.

  Explain how ruth and beneathas ambitions

Explain how Ruth and Beneatha's ambitions and dreams are similar and different in "A rasin in the sun". You have to prepare a whole page on comparing and contrasting them

  State important or unimportant for helping clients

They ignore clients' personal history and unconscious, treating them more like pigeons than people". What makes this important or unimportant for helping clients?

  Achilles gets everything he ever wanted

Achilles gets everything he ever wanted. Is this a good thing for him? Use the fate of Achilles to attempt to work out what Homer thinks of the heroic ideal.

  On the surface the characterizations of eveline and connie

On the surface the characterizations of Eveline and Connie contrast more than they do compare with one another, i.e. Eveline is a Fin de Siècle teenager growing up in Dublin, while Connie is a suburban teenager from "Anywhere" U.S.A. in the 1950's-ea..

  Create a literary canon that fills those holes

Did this course ignore a country, a genre, or an author? Create a literary canon that fills those holes. There are a few rules, though.

  Primary categories of terrorist hazards

Provide a history of its use as a weapon of mass destruction (WMD); describe how it is made and dispersed, signs and symptoms of its use; circumstance where it would be the weapon of choice;

  Writing an effective business letter prepare a letter in

writing an effective business letter prepare a letter in either block or modified block format addressed to your

  Write a journals paper for tattoos on the heart

Write a Journals paper for Tattoos on the Heart.

  Demonstrate understanding of major concepts

Demonstrate understanding of major concepts and/or theories; adequate support and evidence by examples - Is precise, pertinent, and well supported

  How can normal human being possess such a power over another

How can a normal human being possess such a power over another? Count Dracula is undeniably not of this world and Harker's description was enough to make me shudder in my seat.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd