Discuss about the security attacks

Assignment Help Management Information Sys
Reference no: EM131406590

Please answer question as a personal viewpoint upon the following issues:

1. Your boss is asking each engineer from all departments to come up with the one or two sources of network threats and attacks you consider the most critical and why. He wants you to be able to fit your thoughts on an index card. He does not care if the same problem is addressed from several points of view or if you address a very specific "threat of the day" or one from the past that could come back. You are also asked to have an opinion about the potential risks of such threats and attacks.

2. With limited time and resources your manager wants everyone to suggest the structure of a network defense system to protect the computers and the network. Since this is an open discussion if your favorite idea has been discussed "to death" pick the next. These are pro-active steps. Consider at least two solutions and why one ranks high on your mind.

Security attacks on information systems occur all the time and pertain to every aspect of the attacked system. In other words the attacks are directed against all components of a system. The attackers look for the weakest links in each component and using various tools exploit the potential vulnerabilities.

The first step in establishing a secure information system is to consider the potential threats and the corresponding attacks. Next, the risk or the probability of a threat to cause damage to an asset should be evaluated. Once the threat definition and risk analysis are performed, the appropriate solution of defense can be devised.

The purpose of this conference topic is to understand the prerequisite steps that should be taken for a successful implementation of security solutions. Read through Session 4 Lecture Notes, and become familiar with the issues of vulnerabilities. attacks and countermeasures at different layers. We will focus on typical attacks in the Internet affecting confidentiality, integrity and availability mainly on the lower four layers: Layer 1, Physical; Layer 2, Data Link; Layer 3, Network; and Layer 4, Transport.

Reference no: EM131406590

Questions Cloud

What is the bandwidth of this process : Assuming that this process passes through an ideal lowpass filter with a bandwidth of 5 kHz and the output is denoted by Y(t), determine Sy(f), the power spectral density of Y (t), and the total power in the output process.
Application software and system software inventions : List 2 application software and 2 system software inventions that took place in the past 10 years. When was the software invented/introduced? What was the invention? Who invented/introduced the software? You should have a total of 4 inventions lis..
What is organizational change as defined by lewin and kotter : What is organizational change as defined by Lewin and Kotter? How are they similar and different? Compare and contrast the approaches to change presented by Lewin and Kotter.
Best for operating in a cluttered environment : Out of the various frequencies used for 802.11, which is best for operating in a cluttered environment? Why?
Discuss about the security attacks : Your boss is asking each engineer from all departments to come up with the one or two sources of network threats and attacks you consider the most critical and why. He wants you to be able to fit your thoughts on an index card. He does not care if..
Different nosql technologies : The different NoSQL technologies were created to meet different needs. Choose one of the NoSQL data models and describe it. Explain what kind of applications would benefit from your chosen NoSQL data model.
Identify and compare the three major types of rivalries : Identify and compare the three major types of rivalries and how they impact strategic management as well as managerial finance.
Identify one balancing loop and one reinforcing loop : Identify one Balancing Loop and one Reinforcing Loop. These feedback loops should be critical to Whole Foods Market's performance and success. You should have a good idea of what these are from your previous analysis.
Write a matlab script that uses a nested loop : Write a matlab script that uses a nested loop to access the elements of a 5*5 matrix called A, and set the value of the elements to 1 for those elements where the row number is great than the column number.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Explain strategic mis categories in detail

Define MIS ? What are the characteristics of MIS and explain strategic MIS categories in detail. Give relevant examples.

  Develop a comprehensive business continuity plan

The organization should develop a comprehensive Business Continuity Plan. A formal risk assessment should be undertaken in order to determine the requirements for the Business Continuity Plan.

  Cstomer service practices influence the supply chain

What independent variables should you consider when recommending changes to a supply chain, and why

  Prepare two to three paragraph summary of the given article

Create a mind map, and write a two to three paragraph summary of the article that includes three questions for the class and a hyperlink to the original current event article.

  Describe resources that will be needed for supporting system

Describe the resources that will be needed for supporting the system during the startup period. Define ongoing system maintenance roles and responsibilities (Corrective, Adaptive, Protective, Preventive).

  Fair information practices fip codebriefly explain the code

fair information practices fip codebriefly explain the code of fair information practices.solution summarythis solution

  Define procedures and configuration management tools

Imagine that you are a network engineer for a mid-sized company, specify your main responsibilities and suggest strategies to fulfill the responsibilities that you have specified. Provide a rationale to support your suggestion.

  Solutions instead of as a long-term commitment

Explain why the initial investment in using a SOA solution requires a high level of adoption to be worthwhile. What are the limitations of using SOA for short term software solutions instead of as a long-term commitment?

  Describe the seven critical characteristics of information

Describe the seven critical characteristics of information. How are they used in the study of computer security? What is risk appetite? Explain why risk appetite differs for every organization.

  Explain history of decision support systems by dj power

Write a 2 to 3 page essay describing how business decision support systems have evolved over the past several decades as computer and data capabilities have grown. A Brief History of Decision Support Systems by D.J. Power.

  International transfer of knowledge and technologydefine

international transfer of knowledge and technologydefine technology transferwhy is technology tranferred within a

  Why do organizations develop it systems

Why do organizations develop IT systems?"  Consider what you believe to be the five most important reasons organizations develop IT systems.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd