Network security and the internet

Assignment Help Basic Computer Science
Reference no: EM13919783

Module 5 - Case

NETWORK SECURITY AND THE INTERNET

Assignment Overview

The general area of network security is obviously of enormous corporate and national importance. And there's no doubt that intrusion detection and prevention is a principal concern. Lately there have been a number of concerted security attacks on major corporations that apparently feature mixed motives on the part of the attackers: some combination of ideological objections to the corporations combined with an appetite for identity theft. The attackers in this case appeared to be shifting collectives of individuals rather than highly organized rings, as is the case with purely criminal enterprises. One of the most publicized of these recent security attacks is that made on Sony Corporation's PlayStation Network. This has featured at least two and possibly three waves of security assault, accompanied by a singularly lackluster response from the Corporation. Here's a basic introduction to the situation; you may wish to do your own research to fill in the details further, since there's no shortage of information online about this problem:

Kuchera, B. (2011) PlayStation Network hacked, data stolen: how badly is Sony hurt? ArsTechnica. Retrieved Decenber 12, 2011, from https://arstechnica.com/gaming/news/2011/04/sonys-black-eye-is-a-pr-problem-not-a-legal-one.ars

The traditional way to respond to intrusions of this sort is to deal with them as individual actions. This article suggests that what the Corporation needs is simply better firefighting:

Evans, G. (2011) Security Expert: Sony, Microsoft Should Hire Hackers. GamePolitics.com. June 2. Retrieved Decenber 12, 2011, from https://gamepolitics.com/2011/06/02/security-expert-sony-microsoft-should-hire-hackers

On the other hand, the recently published ISACA "business model for information security" suggests that a more systematic approach ought to be taken, including fundamental changes to the organization's culture, in order to build an environment in which security pervades all aspects of the systems. Please review this outline of the so-called "business model":
ISACA (2009) An Introduction to the Business Model for Information Security. Retrieved December 20, 2011 from https://www.isaca.org/Knowledge-Center/BMIS/Documents/IntrotoBMIS.pdf

When you've read through the case articles noted above and other related material, scanned the websites and any other sources you think relevant, and thought about it carefully, please compose a short paper on the topic:
How application of parts of the ISACA business model might help Sony Corp. be prepared for any further hacker attacks

Assignment Expectations

Your paper should be between three and five pages. Take a definite stand on the issues, and develop your supporting argument carefully. Using material from the background information and any other sources you can find to support specific points in your argument is highly recommended; try to avoid making assertions for which you can find no support other than your own opinion.

Your paper should be structured as a point/counterpoint argument, in the following manner. You are expected to:
• Begin this paper by stating your position on this question clearly and concisely
• Citing appropriate sources, present the reasons why you take this position. Be sure to make the most effective case you can.
• Then present the best evidence you can, again citing appropriate sources, against your position -- that is, establish what counterarguments can be made to your original position.
• Finally, review your original position in light of the counterarguments, showing how they are inadequate to rebut your original statement.

By the end of your paper, you should be able to unequivocally re-affirm your original position.

You will be particularly assessed on:
• Precision: Your draw on a range of sources, and to establish your understanding of the historical context of the question. You carried out the exercise as assigned, or carefully explained the limitations that might have prevented your completing some parts (running out of time isn't generally considered an adequate limitation).
• Support for assertions: You use examples, citations (especially to the required readings), and elaboration to support assertions. You provide evidence that you have read the required background materials.
• Clarity: Your answers are clear and show your good understanding of the topic. You see what the module is all about and to structure your paper accordingly.
• Breadth and Depth: The scope covered in your paper is directly related to the questions of the assignment and the learning objectives of the module.
• Critical thinking: The paper incorporates YOUR reactions, examples, and applications of the material to business that illustrate your reflective judgment and good understanding of the concepts. It is important to read the "required readings" posted in the background material plus others you find relevant. Your informed commentary and analysis is vital -- simply repeating what your sources say does not constitute an adequate paper.
• Overall quality: Your paper is well written and the references, where needed, are properly cited and listed (refer to the university guidelines (https://support.trident.edu/files/Well-Written-Paper.pdf) if you are uncertain about formats or other issues.

Module 5 - SLP
NETWORK SECURITY AND THE INTERNET

You'll remember that we're using a common basic format for the Project assignments in all Modules -- that is, the review of relevant professional development websites.

Specifically, for the Session Long Project for this Module, you are to review the Mitnick Security Consulting website [available at https://mitnicksecurity.com/]. Kevin Mitnick was for a number of years one of the most successful bad-guy hackers in the world; at the moment he's presiding over a group of reformed hackerts. An interesting group, no doubt!

You should do the following:
• Look over the range of articles and other resources linked there.
• Follow up links that interest you. In general, become familiar with its contents.
• Pay special attention on the subject of this module and learn as much as you can.
• Look over the career links. Anything interest you? Any interesting themes there?

Then write your review.
SLP Assignment Expectations

Your paper should be two to three pages in length, and reflect your personal experiences with this issue. The important part of all these project assignments is to carefully assess your own experiences with the topic, and then reflect critically on what you might have learned about yourself and about situations through this assessment process.

The more that you can use the exercise to develop personal implications for your growth as a potential business person as well as a moral individual, the more value you'll get out of the exercise.

The general format valid for such reviews in ALL your SLPs here is:
• a short summary description of the website's structure, purpose, pros and cons
• a comprehensive discussion on what you learn from this website regarding the subject of this module (at least half of your write-up should be devoted to this discussion). you can choose to provide a general review, or focus on one theme of your most interest.
• links that you find helpful to follow up
• why you will or will not find it a useful addition to your professional resources list
• any other things about the site that you find salient and worth noting to others
• bottom-line evaluation of its value to you in this program

The last point is very important. Be honest and direct; your assessment is helpful to you and to others. If you don't find it helpful, say so and why, and try to explain what you would find more useful in its place. But also do try to remember also that your education isn't yet finished, that things you don't understand now and don't yet see the value of may turn out later on to be relevant and useful, and that the site's creators may know more about the topic and the profession than you do yet.

Your paper will be evaluated on the following criteria:
• Precision: You carried out the exercise as assigned, or carefully explained the limitations that might have prevented your completing some parts (running out of time isn't generally considered an adequate limitation).
• Clarity: Your answers are clear and show your good understanding of the topic.
• Breadth and Depth: The scope covered in your paper is directly related to the questions of the assignment and the learning objectives of the module.
• Critical thinking: The paper incorporates YOUR reactions, examples, and applications of the material to business that illustrate your reflective judgment and good understanding of the concepts.

Reference no: EM13919783

Questions Cloud

The current market rate of interest on the bright sun bonds : Bright Sun, Inc. sold an issue of 30-year $1,000 par value bonds to the public. The bonds had a 12.68 percent coupon rate and paid interest annually. It is now 14 years later. The current market rate of interest on the Bright Sun bonds is 11.60 perce..
Alpha company normally sells its product : Alpha Company normally sells its product for $20 per unit. It just received a large order from a new customer at a selling price of $16 per unit.
Where does the information on waste come from : Should line employees be involved in making recommendations to improve lean production and processes or should this decision making be left only to management?
What is the percentage change in price of bond : Both bond A and bond B have 7.8 percent coupons and are priced at par value. Bond A has 9 years to maturity, while bond B has 16 years to maturity. a. If interest rates suddenly rise by 2.2 percent, what is the percentage change in price of bond A an..
Network security and the internet : The general area of network security is obviously of enormous corporate and national importance. And there's no doubt that intrusion detection and prevention is a principal concern. Lately there have been a number of concerted security attacks on ..
Discuss the short and long term ramifications : Assume that Kevin has been working for you for five years. He has had an excellent work history and has received generous pay raises in response.
What is a safety stock and when should it be used : What is the difference between synchronous manufacturing and just-in-time manufacturing? Compare how each affects scheduling and controlling. How can a global organization begin to rely on these methods to become more competitive and efficient?
Calculating costs and break-even : Night Shades Inc. (NSI) manufactures biotech sunglasses. The variable materials cost is $12.40 per unit, and the variable labor cost is $6.80 per unit. What is the variable cost per unit? Suppose NSI incurs fixed costs of $760,000 during a year in wh..
What amount would appear in work in process inventory : If the boat is not sold by year end, what amount would appear in Work in Process Inventory and Finished Goods Inventory on the balance sheet for Boat 25?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How many ways are there to pick a collection of 13 coin

How many ways are there to pick a collection of 13 coins from piles of pennies, nickels, dimes, quarters, and half-dollars? Base on the following condition: a) Assuming that each pile has at least 13 or more coins. b) Assuming that each pile has at l..

  What are the transport protocols

What mechanism is used to detect/avoid/correct data transmission collision in Layer 2, such as Ethernet and WiFi? Describe the mechanism in sufficient details.

  Use a for loop to iterate through the array and input values

Use a For loop to iterate through the array and input the values.

  Explain the caching of disk blocks

Explain the caching of disk blocks in terms of database recovery. Also explain what a transaction rollback is and a cascading rollback. Remember to give illustrated examples.

  A one-variable quadratic expression

A one-variable quadratic expression is an arithmetic expression of the form ax^2+bx+c, where a,b, and cc are some fixed numbers (called the coefficients) and x is a variable that can take on different vaues

  Create a chat window using html

Individual: jQuery - Assessment Activity - Week4 - PRG/282 - eCampus Create a chat window using HTML, CSS, and jQuery where you and a customer service representative can chat. with a bot response.

  Given two stringsa and bcreate a bigger string made char a

Given two strings, A and B, create a bigger string made of the first char of A, the first char of B, the second char of A, the second char of B, and so on. Any leftover chars go at the end of the result

  Summarize the facts and ethical issues noted in the article

Summarize the facts and ethical issues noted in the article. Cite your source within the body of your initial post and provide a complete reference for the source, formatted according to APA style as outlines in the Ashford Writing Center, at the ..

  Create account ease of use age appropriateness

Go through and find2 NETS standardshttp://www.iste.org/standards/nets-for-studentsfor each of the above lesson plans you chose and explain why they would be met when using this Web 2.0 tool with the lesson plan you chose.

  The design pattern capability is built into the ide

Review the Design Patterns you have learned this module (CRC Cards and Sun Blue Print Designs.) Use the Internet to find at least two other design patterns. What are the advantages and disadvantages of each? What happens when the design patter..

  Why the sdlc is adequate to develop any system

Why the SDLC is adequate to develop any system. Explain by giving at least two examples of systems, such as client-management systems and decision-support systems.

  Enhanced home utility auditing program

The user should be able to do the following:Enter the cost per kilowatt-hour. Select from a list of home appliances which includes a > or >, among other appliances

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd