Distinguish between vulnerability-threat and control

Assignment Help Basic Computer Science
Reference no: EM132636448

Question

1. Distinguish between vulnerability, threat, and control.

2. Theft usually results in some kind of harm. For example, if someone steals your car, you may suffer financial loss, inconvenience (by losing your mode of transportation), and emotional upset (because of invasion of your personal property and space). List three kinds of harm a company might experience from theft of computer equipment.

3. List at least three kinds of harm a company could experience from electronic espionage or unauthorized viewing of confidential company materials.

4. List at least three kinds of damage a company could suffer when the integrity of a program or company data is compromised.

5. List at least three kinds of harm a company could encounter from loss of service, that is, failure of availability. List the product or capability to which access is lost, and explain how this loss hurts the company.

6. Describe a situation in which you have experienced harm as a consequence of a failure of computer security. Was the failure malicious or not? Did the attack target you specifically or was it general and you were the unfortunate victim?

7. Describe two examples of vulnerabilities in automobiles for which auto manufacturers have instituted controls. Tell why you think these controls are effective, somewhat effective, or ineffective.

8. One control against accidental software deletion is to save all old versions of a program. Of course, this control is prohibitively expensive in terms of cost of storage. Suggest a less costly control against accidental software deletion. Is your control effective against all possible causes of software deletion? If not, what threats does it not cover?

9. On your personal computer, who can install programs? Who can change operating system data? Who can replace portions of the operating system? Can any of these actions be performed remotely?

10. Suppose a program to print paychecks secretly leaks a list of names of employees earning more than a certain amount each month. What controls could be instituted to limit the vulnerability of this leakage?

Reference no: EM132636448

Questions Cloud

Performance-reliability and security : We studied the network criteria: performance, Reliability, and security.
Find the cost that should be assigned to Alpha : Material costs for the month of October were $27,000 and conversion costs were $46,800. Find the cost that should be assigned to Alpha
Describing potential computer security problem : You have recently had experience with and prepare and attach a PowerPoint presentation describing a potential computer security problem related to that system.
Write letter to the IRS regarding their notice : The amount of the payment was $5,400, it was paid on 1/31/16, Please prepare the letter you would write to IRS regarding their notice #24587697 dated 3/14/16
Distinguish between vulnerability-threat and control : Distinguish between vulnerability, threat, and control. List at least three kinds of damage a company could suffer when the integrity of a program
Calculate the timing of password-guessing attacks : Calculate the timing of password-guessing attacks. Design a protocol by which two mutually suspicious parties can authenticate each other.
Mapping business challenges to types of control : Mapping Business Challenges to Types of Control. Identify mitigation techniques for weaknesses of each of the access controls.
Benefits of having web-based access to cloud storage area : Most users today manage their content on a variety of devices. discuss the benefits of having web-based access to a cloud storage area.
Designing data communications network : How can a network designer determine if they are important, and how are they taken into account when designing a data communications network?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Theoretical natural monopolist with down-sloping average

1: For a theoretical natural monopolist with down-sloping average total cost (ATC) curve

  Logical-physical topographical layout of the planned network

Infrastructure document and revised Gantt chart or project plan. Present the rationale for logical and physical topographical layout of the planned network.

  Discuss the problem pythagorean triples

(Pythagorean Triples) A right triangle can have sides that are all integers. The set of three integer values for the sides of a right triangle.

  Describe sequence diagrams

1. Describe sequence diagrams. Include in your discussion how to read them. What does a curved message call line do? 2. What is meant by saying that UP is an iterative and incremental process?

  Consider this transformation to be incremental or radical

Would you consider this transformation to be incremental or radical? Why? How does My developerWorks leverage changes in the way people work?

  Compute the matrices mtm and mmt

Find the SVD for the original matrix M from parts (b) and (c). Note that there are only two nonzero eigenvalues, so your matrix Σ should have only two singular values, while U and V have only two columns.

  Difference between the dba and the phd

You are asked to explain the difference between the DBA and the PhD. Explain the real-world application of the DBA and PhD.

  Perspective first as we get started

If you could change the design of a technology interface you are familiar with, what would those changes be?

  Find the first six positive frequencies

A signal consists of two sinusoids, one of 115 Hz and one of 150 Hz. The signal sampled at a rate of 400Hz. Find the first six positive frequencies that will be present in the replicated spectrum

  Develop a graphical user interface for the citylodge rental

COSC1295 - Advanced Programming - RMIT University - Develop a Graphical User Interface for the CityLodge rental room management program created in Assignment

  What pde will the option price satisfy

Suppose a stock follows geometric Brownian motion in a BlackScholes world.

  Same out of time on homework

if both boys been the same out of time on homework and reading this week wish boy gets more time playing video games? How do you know?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd