List and assess at least three kinds of damage a company

Assignment Help Basic Computer Science
Reference no: EM13555862

1. List and assess at least three kinds of damage a company could suffer when the integrity of a program or company data are compromised. (A description of damage, not a definition of data integrity, is required.)


2. Acme Films produces advertisements for cable television stations. They have two locations in a large metropolitan area. Building 1 contains the administrative, sales, marketing, human resources, development, and graphics departments. Building 2 contains the sound stages, production and post production facilities, equipment, and mobile unit storage. The two buildings, five miles apart, are connected by a VPN using a T1 connection. Each location is protected by hardware firewalls and each location has a DMZ. Building 1's DMZ includes Web, FTP, DNS, and e-mail servers. Building 2's DMZ includes an FTP server from which clients can access work product. Network-based IDS systems are placed in the DMZs. There are 75 Windows XP workstations in each location. Workstation security is centrally managed and includes anti-virus, anti-spyware, and patch management. File, application, database, and print servers at each location are protected by anti-virus, anti-spyware, and patch management. Internet access is provided to users via a proxy server and NAT.
User authentication is controlled by Windows 2008 Active Directory and users must authenticate by using a smart card and entering a PIN. Discretionary access control methods are in use.
List and assess three security threats faced by the information technology systems and list and describe 1 security control needed that would be appropriate to address each threat.

3. You are designing a program that will be able to detect if any of the standard operating system files on a PC have been modified. You decide to use cryptography to accomplish this. Describe how cryptography can be used to meet your goal.

4. You have been asked to give a presentation to a law school class on digital crime. After the presentation, a student asks why so few people are actually prosecuted for computer crime when these crimes seem to be happening all the time. Give a five-point outline of your response to this question. Assess the impact on preventing crimes from your perspective given these issues.


5. After reading about attacks on servers similar to the ones used in one of your company's departments, the CIO has asked you to come up with a report as to what, if any, steps should be taken with your servers. List and describe the steps you would need to take in order to complete a detailed report.
6. Are ethics a matter of absolute right and wrong or are they changeable? Can an ethical person consider something to be wrong and then, later, consider that same thing to be right while still being ethical? Explain your reasoning. (Points : 40)


7. Which of the following statements is true?
From a legal point of view, it is easier to return software to a store because it doesn't meet your needs than it is to do so because the software is of poor quality.
If a programmer is, i) supervised in his work, ii) subject to being fired by his employer, iii) directed in his work by his employer, and iv) under contract for the work he is doing, it is most likely true that the programmer is considered the author of the work he has produced.
A civil judge cannot find that a plaintiff has been harmed and hold a defendant liable if the defendant has violated no written law.
It is easier to prove guilt in a criminal case than it is in a civil case.
A company is not required to protect trade secrets in order to maintain legal protection of the proprietary information.

8. Assess why technical means to assure data confidentiality depend upon trust.

Reference no: EM13555862

Questions Cloud

Barn warm on cold days problem : To help keep her barn warm on cold days, a farmer stores 900 kg of warm water in the barn. How many hours would a 3.50-kilowatt electric heater have to operate to provide the same amount of heat as is given off by the water as it cools from 20.0 C to..
Compute the mass in kilograms of acetic acid : Calculate the mass in kilograms of 3.99 liters of acetic acid. The density of this subatance is 1.05 g/mL
What is the present breakeven point in revenues : What is the current annual operating income and what is the present breakeven point in revenues
Evaluate the speed of rotation of the disc : A disc is rotating about its center. What is the speed of rotation of the disc
List and assess at least three kinds of damage a company : 1. List and assess at least three kinds of damage a company could suffer when the integrity of a program or company data are compromised.
Find out whether it has a bcc or an fcc crystal structure : Silver has an atomic radius of 0.144 nm, an atomic weight of 107.87 g/mol and a density of 10.49 g/cm3 (cm cubed). Determine whether it has a BCC or an FCC crystal structure.
Calculate the magnitude of the electric field at one corner : Calculate the magnitude of the electric field at one corner of asquare 0.8 m on a side if the other three corners are occupied by3.2x10-6 C charges
How many protons are absorbed by the tissue : In an experimental radiation therapy, an equivalent dose of 0.400rem is given to a localized area of tissue with a mass of 0.170kg by 0.800Mev protons. How many protons are absorbed by the tissue
What is the magnitude of the net electrostatic force acting : A point charge of +2Q is placed at the center of a square. When a second point charge of -Q is placed at one of the square's corners, it is observed that an electrostatic force of 4 N acts on the positive charge at the square's center.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd