Discuss a situation where you received security education

Assignment Help Computer Network Security
Reference no: EM131097818

Discussion Questions

I.

Topic 1: CommonPort Scanning Techniques

Do some research on computer ports that are most often scanned by hackers. Identify a port scanning exploit that is interesting to you and share it with the class. If you have experienced or witnessed port scanning activity on a computer network, consider including this in your response as well.

Topic 2: Popular Reconnaissance Tools

Do some research and identify two popular reconnaissance tools. Compare and contrast your chosen reconnaissance tools and explain the benefits and limitations of each.

II.

Topic 1: Wireless

Research the Internet and published research to find a recent wireless exploit that is not discussed in the textbook. Provide a brief summary of the exploit and the threat that it poses to an organization. Also, identify a recommendation for how an organization can protect itself from the exploit.

Topic 2: Organizational Attacks

Websites continue to be a primary vulnerability to organizations. For example, SQL injection attacks have been understood for years, yet organizations continue to fall victim to such attacks. Why do you suppose this continues to be such an issue? Research a recent attack on an organization in which the attack occurred via a vulnerability in the organization's website (and related infrastructure). Describe the attack. What steps could the organization have taken to protect against such an attack?

III.

Topic 1: Hijacking Techniques

A variety of session hijacking techniques have been developed with new techniques continuing to be developed. Using the Kaplan library and the Internet, research session hijacking techniques. Select a session hijacking technique or threat and summarize the technique as well as the threat it presents to the person or organization being attacked. Be sure to include references to the source of your research and try to select a session hijacking technique that has not already been discussed.

Topic 2: Incident Response

Using the Internet, identify an incident where a company or other organization has suffered a security breach. Research the incident, paying particular attention to the way in which the organization responded to it. Post a summary of the incident, followed by your assessment of the organization's response. Did the company respond appropriately and in a timely manner? Why or why not? Be sure to cite the sources of your information.

IV.

Topic 1: User Security Education

You have probably received some form of information security education, either in your workplace, school, or other settings. Discuss a situation where you received security education. How was it delivered? How long did it take? How often, if ever, did you receive refresher or update training? Was the training effective? Why or why not? If you have never received such training, discuss what you think should be included in such training and why it would be effective?

Topic 2: System Hardening

System hardening is the term used to improve a system's security incrementally making it more and more difficult for a hacker to breach it. Research and discuss some best practices in system hardening. Describe any hardening approaches you have seen used, if any.

V.

Topic 1: IDPS Effectiveness

During the lab activity, you gained experience using SNORT. Based on that experience (and any other IDPS experience you have, if any), discuss the benefits and limitations you see with IDPS. What does IDPS do really well? What are some of its shortcomings, and how can those be addressed? Is there ever a situation where an organization would be justified in not using an IDS, IPS, or both? Respond to at least two of your peers' assessments of IDPS effectiveness, focusing on Discussion about why or why not an organization should dedicate some of its financial and human resources to the use of IDPS.

Topic 2: IT 542 Takeaways

Now that you are at the end of the course, consider the security of information you use, have access to, or for which you have stewardship. What have you learned in this class that will help you contribute to the security of that information? How can you help others also contribute to increased information security? Are there any activities that you think would qualify as ‘ethical hacking' that you could do relative to information you work with? If so, discuss.

Reference no: EM131097818

Questions Cloud

What is the range of all primitive data types : What is the range of all primitive data types. Default value (for fields/instance variable ) for any Object type is null. What is the Java API(Application Programming interface)?
Percentage cost of the preferred stock : Pangbourne Whitchurch has preferred stock outstanding. The stock pays a dividend of $10 per share, and sells for $50. What is the percentage cost of the preferred stock?
Caterpillar book debt-to-value ratio : What was Caterpillar's book debt-to-value ratio? (Enter your answer as a decimal rounded to 2 decimal places. Do not round intermediate calculations.)
What does milgram studies reveal about people tendencies : What does the Milgram studies reveal about people's tendencies to go against their own values in authority and what are the similarities and differences in meaning between the words "respect" and "obedience," in your thinking?
Discuss a situation where you received security education : You have probably received some form of information security education, either in your workplace, school, or other settings. Discuss a situation where you received security education. How was it delivered?
Essay on your approved business decision : Write an 1,050-word argumentative essay on your approved business decision in which you include the following:
Withdraw quarterly payments : How much should be originally placed in a trust fund in order to do the following? I want my daughter to be able to withdraw quarterly payments of $700 for 10 years. Money earns an annual rate of 8% compounded quarterly. (After the last withdrawal..
Blue currency unit and red currency unit : In the economy of Mungo, discussed in your workbook, there is a third person called Ike. Ike has a red income of 40 and a blue income of 10. (Recall that blue prices are 1 bcu [blue currency unit] per unit of ambrosia and 1 bcu per unit of bubblegum...
How would you test the validity of folk wisdom : How would you test the validity of this folk wisdom idea using the scientific method - Describe how you would conduct the research

Reviews

Write a Review

Computer Network Security Questions & Answers

  Implementing and managing an information security

Develop a list of at least five (5) best practices for implementing and managing an information security governance program within an organization

  Summarize how virtualization works

Summarize how virtualization works, what it can be used for, what the security flaws are, and why the security issues associated withvirtualization might be of concern.

  Information on the current security state

You selected an organisation, and provided information on the current security state and made suggestions of improvements to their security

  You work as a network administrator for a college located

you work as a network administrator for a college located in your local city. next door to the college is a new gated

  Is internet pose threats to traditional client server system

Hures is a leading human resource service provider. To keep up with growing business demands,it implemented its first information system in 1987 purchasing a main frame computer that servedso-called dumb terminals on the users' desktops.

  When deciding on the proper architecture to run an

the data that organizations gather about their users can vary between strictly commercial information what books did

  Identify different categories of network security attacks

Identify different categories of network security attacks in LAN and WAN environments - apply specific security solutions for different types of attacks

  Bring voice over internet protocol to the entire

paper in apa format with labels for each section to include an introduction main topicbody and sub-topics and

  Calculate an rsa signature on a long message

Would it be reasonable to compute an RSA signature on a long message by ?rst computing what the message equals mod n, for some ?xed n and then signing this computed value only. Why or why not?

  Determine the level of necessary controls to mitigate risks

Describe how an organization determines the level of necessary controls to mitigate the risks while considering the value of its assets.

  Combine the two disks into one logical volume

Illustrate your explanation by using the Linux Log- ical Volume Manager to combine the two spare disks available on the Virtual Debian distribution. Combine the two disks into one logical volume. Format the new logical disk and modify the /etc/fst..

  Improving the security of the current network

The plan includes improving the security of the current network and establishing a secure environment for data exchange between the headquarters (Brisbane) and other offices.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd