Difference between an insider attack and an outsider attack

Assignment Help Computer Network Security
Reference no: EM13863928

Write the questions followed by your answers.

1) You are in charge of IT assets for a company. You are attending a meeting with your management to address questions and concerns around security for the organization. You are the featured presenter at the meeting. The meeting starts in a somewhat unstructured fashion and you are presented with the following questions.

You need to provide an answer for each of the 5 following questions. After you answer these questions you can move to the 2nd part of the presentation.

a) We have never had an attack. Why are you so concerned now?

b) How would we determine what assets we have, what needs to be protected, and how to protect them?

c) I have heard we need a written security policy. Why would we need a written policy? How often would we need to revise it? Who in the organization would need to be involved in this process?

d) What is the difference between an insider attack and an outsider attack?

e) What is this defense in depth approach to security that we keep hearing about?

2) You are in charge of the IT assets for your company. How do you make the case to your management that investing the time and money into malware protection is money well spent?

For this question you need to write an outline for a presentation you are going to make to management to persuade them to invest in malware protection. The approach to the presentation needs to be factually persuasive. In other words, you need to provide an outline that will demonstrate to management through empirical evidence, business acumen, technology trends and project planning why investing in malware protection makes sense.

For each point in your presentation outline you should provide some detail and description that supports why you selected each item.

This is an outline for the presentation rather than the actual presentation. Therefore we are looking for the approach you are going to take for the final presentation and how you will support the various aspects of the presentation. For example, what sort of points are you going to make and how will you support them. The outline will require some of the technical details that will describe how you will build the final presentation.

Reference no: EM13863928

Questions Cloud

Analyze wealth transfer between investor and entrepreneur : Analyze the wealth transfer between the investor and the entrepreneur. What can you say about how much they would be willing to spend on monitoring and bonding?
Corporation special situations and organization structure : Corporation Special Situations and Organization Structure
Plan to create a new business : You plan to create a new business, which you want to be designated as minority and women owned (MWBD).Before you can incorporate your company, you must research the following: How you can become certified as MWBD
What are numerical value of the profits for st equal to zero : Draw a graph showing the profits from the two-option portfolio as a function of the underlying asset's price. What are the numerical values of the profits for ST = 0 and ST = X?
Difference between an insider attack and an outsider attack : What is the difference between an insider attack and an outsider attack? What is this defense in depth approach to security that we keep hearing about
Determine over applied overhead for the month : Kirkaid Company recorded the following transactions for the just completed month: $98,000 in raw materials were requisitioned for use in production. Of this amount, $79,000 was for direct materials and the remainder was for indirect materials. Determ..
What types of activities are internal service funds used : what types of activities are internal service funds used to account?
Manufacturing using job costing : Manufacturing using job costing. In may material requisitions were $50834 and raw material purchases were $35634. The end of month balance on raw material inventory was $5277.What was the Beginning raw material inventory balance?
How the dp flow measurement transducer operates : How the DP flow measurement transducer operates and how the DP flow transmitter vertical works?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd