Explain information security threats and vulnerabilities

Assignment Help Computer Network Security
Reference no: EM13810945

Watch the Information Technology Security for Small Businesses video from the National Institutes of Standards and Technology (NIST):

Information Technology Security for Small Business(https://www.youtube.com/embed/ajwX-7jVLo0)

Then write an information security white paper that can be used to market your firm's security consulting services to small businesses in the Washington, DC, area. Your white paper must:

  • Be concise-no more than three pages long.

  • Provide a general explanation of the business need for information security (protection measures) even in the smallest of businesses (e.g., protect against loss of profit, damage to company's reputation, costs of litigation, etc.).

  • Explain information security threats and vulnerabilities in plain English to small business owners who, while experts in their own business areas, have limited knowledge of computers, networks, and software.

  • Explain the following key concepts as part of the threats and vulnerabilities discussion:

    • confidentiality
    • integrity
    • availability
    • non-repudiation
    • authentication
    • authorization
    • risk
  • Recommend technologies, processes, and policies that can be used to solve or mitigate one of the following common information security threats:

    • data breach and/or data theft (confidential client information)
    • denial-of-service (DOS) attacks
    • insider theft of intellectual property
    • deliberate corruption of electronic files (hacker attack or malicious insider) including virus/worm infections
  • Discuss the impact or results that can be expected:

    • costs and benefits of effective protection measures
    • costs and penalties of ineffective or nonexistent protection measures.

Reference no: EM13810945

Questions Cloud

Summary of the following reading about international moneta : Summary of the following reading about  International Monetary Fund's Board of Governors In good times and in bad, the world is interconnected. Upticks in European markets affect traders in North America. Downturns on one side of the globe are felt w..
Find the velocity of the bomb when it hits the water : Find the velocity of the bomb when it hits the water - what is the deceleration of the bomb and what is the average force of impact?
Define occurrence of globalization in globalization debates : What is some of the evidence given for and against the occurrence of globalization in globalization debates. Which of the arguments do you find more convincing and why
How are these two objectives related : If the marginal cost of letting another vehicle across a bridge or travel through a tunnel is nearly zero, how should the MTA set tolls in order to maximize profit? In order to maximize toll revenue? How are these two objectives related?
Explain information security threats and vulnerabilities : Explain information security threats and vulnerabilities in plain English to small business owners who, while experts in their own business areas, have limited knowledge of computers, networks, and software
Summary on the following reading about business ethics : Summary on the following reading about business ethics: In today's cutthroat, corporate world of downsizing, mega mergers, and hostile takeovers, business and ethics often seem at odds. Companies have always had to pay attention to the bottom line.
Homeland security and crisis management planning : Homeland Security and Crisis Management Planning
Draw a free body diagram for the woman : Draw a free body diagram for the woman. What is the reading on the scale - What happens to the distance between the monkey and the bananas.
Document for a information system transformation : 4-6 pages Business Requirements Document for a Information System Transformation for a law firm and two other agencies a Security Firm; Investigation Firm all have seperate data base; I have to come up with how to create a centralized database

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd