Iterative security management process

Assignment Help Computer Network Security
Reference no: EM13541964

Part -1:

List the three fundamental questions IT security management tries to address.

List and briefly define the four steps in the iterative security management process.

What is the simple equation for determining risk? Why is this equation not commonly used in practice?

Research the IT security policy used by your university or by some other organization you are associated with. Identify which of the topics listed in Section policy addresses. If possible, identify any legal or regulatory requirements that apply to the organization. Do you believe the policy appropriately addresses all relevant issues? Are there any topics the policy should address but does not?

Part -2:

List and briefly define the three broad classes of controls and the three categories each can include.

List and briefly define the elements from the implementation of controls phase of IT security management.

As part of a formal risk assessment of desktop systems in a small accounting firm with limited IT support, you have identified the asset "integrity of customer and financial data files on desktop systems" and the threat "corruption of these files due to import of a worm/virus onto system." Suggest reasonable values for the items in the risk register for this asset and threat, and provide justifications for your choices. Consider the risk to "integrity of customer and financial data files on system" from "corruption of these files due to import of a worm/virus onto system," as discussed in above problem. From the list shown in detailed NIST SP800-53 Security Controls, select some suitable specific controls that could reduce this risk. Indicate which you believe would be most cost effective.

Part -3

List and describe some measures for dealing with inappropriate temperature and humidity.

What principles should be followed in designing personnel security policies?

List the broad categories of security incidents

Part -4:

List and explain the differences among four different categories of audit trails.

What are the main elements of a UNIX syslog facility?

Define three types of intellectual property.

What is digital rights management?

Review the results of a recent Computer Crime Survey such as the CSI/FBI or AusCERT surveys. What changes do they note in the types of crime reported? What differences are there between their results and those shown in Table CERT 2007 E-Crime Watch Survey Results?

Article: Please choose a recent technical article from a referred journal or conference proceedings on the topic of threats and vulnerabilities of computer information systems. You are required to provide:

-A complete reference for the article
-A brief summary and a critical analysis of that article.

Learning Objectives

The purpose of this assignment is to describe and summarize the content and fundamental argument of an article in a concise format, and through this exercise to practice skills in critical reading. 

-A paragraph showing the summary of the article

-Your opinion of the article's quality and your own position. Did the writer do sufficient research? Is the article technically correct? Are there elements of the argument that could have been enhanced with more detail or more argumentation? What would a follow-up article contain to be useful to this one? Did you agree with the article? Did it support or change your opinion? If not, then why?
-Use the APA style for references and citations.

Available Sources:

Publications, including conference proceedings from the IEEE or ACM (available through NSU's electronic library). You are encouraged to choose an article from one of the following leading publications in the field. You are also encouraged to cite additional references in the literature when necessary.

Journals

ACM Transactions on Information and System Security (TISSEC)
IEEE Transactions on Dependable and Secure Computing
IEEE Transactions on Information Forensics and Security
Journal of Computer Security

Conferences
IEEE Symposium on Security and Privacy
ACM Conference on Computer and Communications Security
International Cryptology Conference 

Reference no: EM13541964

Questions Cloud

Estimate the velocity of the first car after the collision : A 563 kg car moving at 19.7 m/s hits from behind another car moving at 14.6 m/s in the same direction. what is the velocity of the first car after the collision
Find out the equilibrium constants for the acid-base : Write net Bronsted equations and determine the equilibrium constants for the acid-base reactions that occur when aqueous solutions of the following are mixed.
Find the emf induced in the coil as a function of time : A toroid having a rectangular cross section (a = 2.00 cm by b = 3.00 cm) and inner radius R = 3.80 cm consists of 500 turns of wire that carries a sinusoidal current I = Imax sin ?t, find the emf induced in the coil as a function of time
Explain the temperature of the tire in degrees celcius : An automobile tire at 32.0 psi at 25.0ºC is driven on a trip. At the end of the trip the pressure is 35.0 psi. What is the temperature of the tire in degrees Celcius
Iterative security management process : List the fundamental questions IT security management tries to address and list and briefly define the four steps in the iterative security management process.
Compute what is the mass of each : Two objects attract each other with a gravitational force of magnitude 9.30 10-9 N when separated by 19.2 cm. If the total mass of the objects is 5.04 kg, what is the mass of each
How much heat is required to raise the temperature of gold : The specific heat of solid gold is 0.13 J/g C. How much heat is needed to raise the temperature of 25.0 g of gold from 23degrees C to it's melting point at 1063 degrees C
Evaluate the speed of the galaxy relative to the earth : Intelligent beings in a distant galaxy send a signal to earth in the form of an electromagnetic wave. What is the speed vrel of the galaxy relative to the earth
Explain n2o2 to effuse under the same conditions : A sample of N2 (g) effuses through a tiny hole in 19.0 s. How long would it take for a sample of N2O2 (g) to effuse under the same conditions

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd