Reference no: EM13761789
Part 1
"Security Objectives" Please respond to the following:
· The confidentiality, integrity, availability (CIA) triad represents generic security goals. CIA is typically applied to specific areas of information technology as a metric or guideline for establishing or maintaining security. Apply CIA principles to email technology. Explain in detail how each of the three components of CIA can be satisfied in a typical email transaction from one user to another. Be sure to include specific technologies involved (such as digital certs, signed certs, encryption, etc.).
· Security today, in one way or another, depends on trust relationships. Describe two scenarios in which the trust relationship between a user (client) and e-Commerce site (server) may be violated after being granted digital certificates from the same certificate authority (CA). Also, determine some possible mitigation steps.
Part 2
"Necessary Filtering " Please respond to the following:
· Analyze in detail a non-stateful firewall's interaction with the transmission control protocol / Internet protocol (TCP / IP) stack as a packet arrives from an internal (trusted) interface and is destined for a network on its external interface. Describe the details of the decision-making process.
· As you may already be aware of by now, port 80 traffic possesses one of the largest security threats in the IT industry today. This is evident since in today's world the Internet is so powerful and is used for so many different purposes within any organization that it cannot be completely taken out of the picture. Explain in detail how a Web proxy might be used to detect malware from entering or leaving organizations.
Diesel engine designer watches can be extremely sturdy
: Diesel engine is surely an Italian firm as their principal earnings emanates from offering apparel. These are renowned pertaining to Skinny jeans and also other equipment which have been geared towards diesel watches impacting your junior. The cor..
|
Encryption requirements as stated in the law
: Identify ONE law, either a US Federal Law or a US state law, that requires the use of encryption to protect either consumer or corporate information from unauthorized disclosure. Write a 150+ word plain English summary in which you address the fol..
|
Program reads the contents of employees
: Design a program that reads the contents of the employees.dat file and prints all the data within it. Format the report as designated in the Printer Spacing Chart below.
|
Ethical issues in information systems
: Ethical Issues in Information Systems- Choose one (1) ethics issue, You may also use the Internet or the Strayer Library to research articles on ethical issues in information systems and choose one (1) ethics issue of interest to you
|
Explain areas of information technology as a metric
: The confidentiality, integrity, availability (CIA) triad represents generic security goals. CIA is typically applied to specific areas of information technology as a metric or guideline for establishing or maintaining security.
|
Network implementation plan
: Network Implementation Plan-After a network has been installed and becomes operational, the system must be maintained. An important part of an implementation plan is preparation for the operation of the network and the potential problems that migh..
|
Display the commands
: Display the commands(s) used to do the following (and show the results): see the df command to view file system use in megabytes.
|
Research organizational benefits of using databases and dbms
: Research organizational benefits of using databases and DBMS's. Supplement your research with a review of your lessons. Post a response to the discussion board: Respond to the following statements and, if appropriate, include personal experience as..
|
Crime and ethics based problems
: Some violations, although technically a crime, may be referred to as an administrative violation, which involves fines.
|