Identify the current software security threats

Assignment Help Computer Network Security
Reference no: EM13938515

Description: The Emirates started in 1985, and today it has become the largest airline in the Middle East. It's Dubai based head office manages approximately 50,000 employees and has a turnover of US$ 18.4 billion turnover per year. The IT Security & Information Assurance department (ISIA) of this large organisation has several key responsibilities, including designing, planning and creating of secured infrastructure. The ISIA is led by a Chief Information Security Officer (CISO) and eight security managers responsible for the key areas, such as Information & Physical security, Privacy, Business continuity, Managing Malware and Botnets, Identifying security holes and Applying appropriate remediation measures. With growing technological advances and recent threats to Information Security, senior management is concerned about organisational preparedness to handle the threat. The CISO strongly believes that the assessment of security risks and proactive steps to manage these risks are the key steps for both hardware and software security. The CISO often thinks that The Open Web Application Security Project (OWASP) is a good source to identify the current software security threats.

Task: As a first step, CISO asks you, one of the Security Managers, to review the top ten risks listed under OWASP so that Emirates is informed about the current software risks and the steps they need to take to handle them. Your responsibility is to identify and analyse at least FIVE major risks listed under the OWSAP and propose ways to overcome those threats. Your evaluation of risks and suggestions must be presented in a report format to CISO.

Reference no: EM13938515

Questions Cloud

What depreciation method does abercrombie and fitch use : What depreciation method does Abercrombie & Fitch use? What depreciation method does Aeropostale use? What are the typical useful lives of each company's operating assets?
Calculate the present value break-even point : Calculate the present value break-even point (also called the financial break-even point). Initial Investment: $700. Fixed Cost: $200 per year
Duration of the project at an interest rate : In OLQ2 and GSPT1 you did numerous duration calculations for a variety of bonds. Examining your results, explain how your results illustrate the following claims (from slides 41-42 of your week 06 lecture).
Best choice for a market index in the regression : Legion, Inc. is a small high tech firm whose stock trades on the NASDAQ. You want to estimate the stock's beta using a regression based on the empirical market line. That requires regressing the stock's returns against the contemporaneous returns on ..
Identify the current software security threats : The CISO often thinks that The Open Web Application Security Project (OWASP) is a good source to identify the current software security threats.
What results from other tests would contribute to diagnosis : Although a bone density scan is the test that verifies a diagnosis of osteoporosis, what results from the other tests (chemistry profile, thyroid studies, urinalysis, and CBC) would contribute to the diagnosis?
Set of measurements for the lifetime : You have been supplied with a set of measurements for the lifetime of a bearing in the file ass3q1data.csv. You should use this data to construct a model for the behaviour of the real lifetime (the lifetime of the population). It has been well-est..
Firm is financing its growth with retained earnings : A firm is financing its growth with retained earnings. It is retaining 80 percent of its annual earnings. The firm's historic return on equity is 16 percent, a figure that is expected to continue into the future. How much will earnings grow over the ..
Write a main function that declares an array of 10 grocery : Write a main() function that declares an array of 10 GroceryItem objects. Assign values to all 10 items and display them.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd