How could an attacker compromise availability

Assignment Help Computer Engineering
Reference no: EM131486427

Technology Evaluation Study Plan - Detailed Assignment Description

This assignment is the third and final part Analysis of Alternatives exercise.

Choose one of the student-written Technology Selection papers from the list posted.

Read your chosen Technology Selection paper to learn more about the selected technology. Next, consider what type of formal evaluation study could be used to learn more about this technology and how it is likely to interact with people, processes, and technologies. Then, design a formal evaluation study which could be used to obtain more information about one or more of the following:

o characteristics (features and capabilities) of the technology
o interactions among technologies, people, environments, and processes (use cases or scenarios)
o risks or vulnerabilities associated with adoption of this technology
o costs and benefits associated with adoption of this technology

CHOOSE YOUR EVALUATION METHOD

Your evaluation study design must use one of the following:

o Case Study
o Delphi Study (panel of subject matter experts)
o Quasi-Experiment (e.g. penetration testing or pilot testing in a controlled environment)
o Pilot Implementation (in a demonstration environment)

See theTechnology Evaluation Methods module in the Week 2 conference for detailed descriptions of each of these types of evaluation methods.

DESIGN YOUR STUDY

Identify the specific questions that your formal evaluation study will address. These questions must be security-focused (review the Pillars of Information Security and Pillars of Information Assurance for ideas). Your design should include a description of the specific security issues which will be tested or security capabilities which will be evaluated. Use standard terminology when writing about security issues (see the rubric).

DEVELOP YOUR EVALUATION STUDY PLAN

Use your study design to prepare a high-level plan for your evaluation study. Your plan must include the following:

o Introduction

- description of the emerging technology and justification for including it in an evaluation study

o Research Question(s)

- These must be security focused. Use the Five Pillars of Information Assurance and / or the Five Pillars of Information Security.
- Use "how" or "what" questions (writing good "why" questions is beyond the scope of this course).
- Examples
- What vulnerabilities exist that could be attacked to compromise confidentiality?
- How could an attacker compromise availability?
- For each research question, provide a brief description of a scenario or use case which could be used to answer the question. Your description should be one paragraph (no longer).

o Methods

- high level design of the study (focus upon the evaluation model and your research questions)

- description of how the technology will be incorporated or used in the study (including specific security issues which will be tested or security capabilities which will be evaluated)

- notional system or network architecture diagram showing the pilot test environment (only if you are doing a pilot study)

o Limitations or Special Considerations

- any special considerations or security concerns which must be addressed (e.g. "clean room," test data sanitization, or isolation environment to prevent the pilot study from causing harm to operational systems)

o Timeline of Events (Notional)

- A notional timeline (expressed in days or months after start date) for your study

NOTIONAL TIMELINE OF EVENTS

The notional timeline of events (stated in days or months after start) that provides an estimate of how long you expect your evaluation study to take. For a Delphi Method study, your study could take as little as a day or two. For a Delphi Method Study, include the number of "rounds" and how long each round will be (the time allotted for experts to consider information and reply back with their opinion on the questions or issues).For a case study, quasi-experimental, or pilot implementation design, your study may span several months; in this case, divide your timeline into phases (setup, testing, reporting).

COST ESTIMATE IS NOT REQUIRED

Normally, an evaluation study plan will include a cost estimate. For this course, we will NOT be including cost elements in our evaluation study plans as the information required to developthese items is not readily available to students. If you wish to address this area of a study plan, limit your discussion to a brief listing of the cost elements (people, technologies, facilities) and state that a cost estimate will be provided separately.

DOCUMENT YOUR PLAN

Your Technology Evaluation Study Plan should be at least three pages in length but no more than ten pages (excluding the title page and references page). This should be a high level design that can be read quickly. Your study plan must contain the five major sections defined above and comply with the formatting guidance provided by your instructor.

Attachment:- Technology_Selection_Paper.rar

Reference no: EM131486427

Questions Cloud

Differentiate a general obligation bond and a revenue bond : What is the difference between a Treasury bill, a Treasury note, a Treasury bond, and TIPS?
What do you find personally satisfying or dissatisfying : What do you find personally satisfying or dissatisfying at work or school?Have you created a safe environment for those under your leadership?
Calculate the annual interest : Calculate the annual interest and the semiannual interest payment for corporate bond issues with a face value of $1,000.
Quality plan on the web. search internet for quality plans : Some healthcare organizations post their quality plan on the web. Search the Internet for quality plans from 2 different types of health care organizations
How could an attacker compromise availability : What vulnerabilities exist that could be attacked to compromise confidentiality? How could an attacker compromise availability?
Classes to include the overridden method : Modify your implemented classes to include the overridden method, computeSales(), that computes the current sales in each of the following categories:
Advantages of using each research methodologies : What are the advantages of using each research methodologies? They are in bold.
What is civil law and common law : What is civil law and common law?
Erp system to integrate health care and financial data : Hospital is Implementing new ERP system to integrate Health Care-Financial data. Identify three different types of architecture that hospital can put in place

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd