UFCFHJ-15-M Information Security Assignment

Assignment Help Computer Engineering
Reference no: EM132607352

UFCFHJ-15-M Information Security - University of the West of England

SECTION A

1. At your job interview for a senior information security position, a panel member asks you about your understanding of information security goals.

a) Stating any assumptions, briefly explain how two of the five pillars of Information Assurance: i.e. availability, integrity, authentication, confidentiality and non-repudiation, contribute to ensuring trust and integrity in information systems.

b) In information security terminology, outline what is meant by an adversary, risk, threat and vulnerability. Provide one example of each.

c) One of the interview panel members uses the terms computer security and information security interchangeably. Summarise how you would distinguish between each term. Give one example situation or scenario to illustrate each term.

2. The University was recently featured in the news headlines for all the wrong reasons. It had become the unhappy victim of a ransomware attack.

a) Illustrate a typical exploit kit from the attacker's perspective.

b) From the viewpoint of a criminal perpetrator, develop an attack strategy to inject or insert and activate the ransomware into the University.

c) Summarise prevention and recovery approaches the University could adopt to defend itself against and mitigate damage from a ransomware attack.

3. The INFOSEC organisation cites the top five cyber vulnerabilities with the highest potential for catastrophic damage as being: injection vulnerabilities, buffer overflows, sensitive data exposure, broken authentication and session management and security misconfiguration.

a) Outline the characteristics of three of INFOSEC's cited cyber vulnerabilities, providing one example of each.

b) Assume that an organisation's defensive information security strategies are based upon Sun Tzu's The Art of War, i.e. they involve deception, frustration, resistance and recognition and recovery.

Explain one of The Art of War based defensive information security strategies. Illustrate your answer with a defensive example based upon one of the top five INFOSEC cited cyber vulnerabilities.

4. Your non-technical boss is clearly confused by information security terminology and identity management concepts. He reluctantly asks for an explanation in straightforward, non-technical terms.

a) When developing technical information security measures, identification and authentication are considered important concepts. Summarise both concepts and state why they matter to an organisation.

b) Considering authorisation, explain what is meant by the principle of least privilege. Provide one example of the principle being applied to support your answer.

c) Your boss accepts your further explanation that access control involves four basic tasks: allowing access, denying access, limiting access and revoking access. But, he doesn't understand the difference between the different types of access control.

Show what both logical access control and physical access control are, by giving one example of each type of access control.

Reference no: EM132607352

Questions Cloud

What is the present value of the payments : Suppose you are going to receive $13,500 per year for five years, with the first payment to be received today. The appropriate interest rate is 7.5%.
Find the interest rate : An investment grows from $10,240 to $10,700.80in one year. a) Find the interest rate.
European call options with a strike price : The current price of a stock is $145, and three-month European call options with a strike price of $149 currently sell for $6.40.
Compute the coefficient of variation : Shack Homebuilders Limited is evaluating a new promotional campaign that could increase home sales. Compute the coefficient of variation
UFCFHJ-15-M Information Security Assignment : UFCFHJ-15-M Information Security Assignment Help and Solution, University of the West of England - Assessment Writing Service
Developing a strategy to manage interest rate : You are developing a strategy to manage interest rate risk of your portfolio using
What is the profitability index for project : a) What is the IRR for each project? b) What is the NPV for each project?
How changes in the rate of interest by central bank : Discuss how changes in the rate of interest (i.e. discount rate) by the Central Bank of a country can affect stock returns.
Why the knowledge of audit risk is so important for auditors : Why the knowledge of audit risk is so important for auditors? Give specific statement as to whether each component is subject to the control of the auditor

Reviews

Write a Review

Computer Engineering Questions & Answers

  Explain why you chose advantage and challenge that you did

Explain why you chose the advantage and challenge that you did, and provide one real-world example of each environment.

  Write a program that allows the user to add

Write a program (PYTHON) that allows the user to add, delete and organize the items in a list.

  Why institutions are reluctant to move their it to the cloud

Discuss in 500 words, why institutions are reluctant to move their IT to the cloud. Consider specific industries like education, medicine, military, etc.

  Derive a generating function for the sequence

Let t_n be to of ways to tile an 2 times n array with 1 times 2 tiles and 2 times. Derive a recurrence for t_n. Derive a generating function for the sequence.

  What does the php function mysql-fetch-array do

What does the PHP function mysql_fetch_array do? Explain the exact form of the value returned by mysql_fetch_array.

  What are the primary types of nonfunctional requirements

What are the primary types of nonfunctional requirements? Give two examples of each. What role do nonfunctional requirements play in the project overall?

  Create a pivot table using given information

Create a Pivot Table. Department & Full Tim/Part Time List: On one sheet: 1. Create a simple listing of 3 departments relative to your industry.

  Describe the connection between knowledge or concepts

Reflect on the connection between knowledge or concepts from the course Cryptography how those have been, or could be, applied in the workplace as a software.

  Prepare and test an html document that describes nested list

Prepare and test an HTML document that describes nested ordered lists of cars. The outer list must have three entries: compact, midsize, and sports.

  Write a routine to identify concave polygons

Write a routine to identify concave polygons by calculating cross products of pairs of edge vectors.

  How do you determine the hop limit in flooding

How do you determine the hop limit in flooding? What can be done to protect a centralized routing network if the computer hosting central routing table fails?

  Make a proposal to deploy windows server onto an existing

make a proposal to deploy windows server onto an existing network based on the provided scenario. the proposal will

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd