Explain areas of information technology as a metric

Assignment Help Basic Computer Science
Reference no: EM13761789

Part 1

"Security Objectives" Please respond to the following:

· The confidentiality, integrity, availability (CIA) triad represents generic security goals. CIA is typically applied to specific areas of information technology as a metric or guideline for establishing or maintaining security. Apply CIA principles to email technology. Explain in detail how each of the three components of CIA can be satisfied in a typical email transaction from one user to another. Be sure to include specific technologies involved (such as digital certs, signed certs, encryption, etc.).

· Security today, in one way or another, depends on trust relationships. Describe two scenarios in which the trust relationship between a user (client) and e-Commerce site (server) may be violated after being granted digital certificates from the same certificate authority (CA). Also, determine some possible mitigation steps.

Part 2

"Necessary Filtering " Please respond to the following:

· Analyze in detail a non-stateful firewall's interaction with the transmission control protocol / Internet protocol (TCP / IP) stack as a packet arrives from an internal (trusted) interface and is destined for a network on its external interface. Describe the details of the decision-making process.

· As you may already be aware of by now, port 80 traffic possesses one of the largest security threats in the IT industry today. This is evident since in today's world the Internet is so powerful and is used for so many different purposes within any organization that it cannot be completely taken out of the picture. Explain in detail how a Web proxy might be used to detect malware from entering or leaving organizations.

Reference no: EM13761789

Questions Cloud

Diesel engine designer watches can be extremely sturdy : Diesel engine is surely an Italian firm as their principal earnings emanates from offering apparel. These are renowned pertaining to Skinny jeans and also other equipment which have been geared towards diesel watches impacting your junior. The cor..
Encryption requirements as stated in the law : Identify ONE law, either a US Federal Law or a US state law, that requires the use of encryption to protect either consumer or corporate information from unauthorized disclosure. Write a 150+ word plain English summary in which you address the fol..
Program reads the contents of employees : Design a program that reads the contents of the employees.dat file and prints all the data within it. Format the report as designated in the Printer Spacing Chart below.
Ethical issues in information systems : Ethical Issues in Information Systems- Choose one (1) ethics issue, You may also use the Internet or the Strayer Library to research articles on ethical issues in information systems and choose one (1) ethics issue of interest to you
Explain areas of information technology as a metric : The confidentiality, integrity, availability (CIA) triad represents generic security goals. CIA is typically applied to specific areas of information technology as a metric or guideline for establishing or maintaining security.
Network implementation plan : Network Implementation Plan-After a network has been installed and becomes operational, the system must be maintained. An important part of an implementation plan is preparation for the operation of the network and the potential problems that migh..
Display the commands : Display the commands(s) used to do the following (and show the results): see the df command to view file system use in megabytes.
Research organizational benefits of using databases and dbms : Research organizational benefits of using databases and DBMS's. Supplement your research with a review of your lessons. Post a response to the discussion board: Respond to the following statements and, if appropriate, include personal experience as..
Crime and ethics based problems : Some violations, although technically a crime, may be referred to as an administrative violation, which involves fines.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Categorize the point-of-sale system in supermarket

Categorize the following systems and explain your classification: A point-of-sale system in a supermarket, A system which sends out reminders that magazine subscriptions are due to be paid.

  Convert the decimal integer

Convert the decimal integer -24 to 16 bit and 32 bit two's complement hexadecimal representation. show your calculations.

  Differentiate centralised and distributed data processing

Explain the differences between centralised and distributed data processing. Describe the pros and cons of each approach.

  Compare with that of a general pda

c) Could the Mark 100 or Mark 200X process this string: 0n1n? How about 1n0m1m0n? Succinctly justify you answer. d) How does the power of the Mark 100 and Mark 200X compare with that of a general PDA? Succinctly justify your answer.

  Explain what are the right metrics of agility

What are the right metrics of agility. Are there systematic techniques to improve the agility of a system

  Show fetch-execute cycle for instruction that clears

Using the register operation's, show the fetch-execute cycle. Show the fetch-execute cycle for an instruction that clears A (i.e., sets A to 0).

  Use a common data center of twenty

Analyze and explain how you would use DNS in your plan. Compose a two-paragraph executive summary highlighting the main points of your plan. Use at least three (3) quality resources in this assignment.

  How it sales manager learn technical in his role

How does an IT sales manager learn to be technical in his role without over complicating the IT aspects most consumers want to understand

  Create application that lets user select two primary colors

when the user clicks mix button,the form's background should change to the color that you get when you mix the two selected primary colors. note: i want the solution in visual c# not in c++ plz

  Flight availability request application

Define a simple Web Service in WSDL that returns flight information regarding flights of a particular flight operator, see the first question

  Write a function takes two int arguments

Write a function takes two int arguments (raise AssertionError if the first is > the second); it returns a function that takes an int as an argument and returns a bool indicating whether that value is between the two arguments passed to betwee..

  Involved in a team charged to repair

1. You are involved in a team charged to repair and maintain a web-based ticket distribution system, what are the necessary questions your team should pose to the owner? Make up five questions and suggest solutions to them. Keep your answe..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd