What assets are important for you to protect

Assignment Help Computer Network Security
Reference no: EM131644042 , Length: word count:1200

Real World Practices for Cyber Security Assignment

Question 1 -

Consider the following scenarios. Imagine that you are the in-charge of the security in each scenario. Explain how would you apply concepts of computer security to create a safer atmosphere by answering the questions below.

Scenarios

i. You are the in-charge of the Myki central sever at Melbourne.

ii. You manage the email server for a major election campaign.

iii. You are grading homework submissions for a class of 360+ students.

iv. You are the network administrator of the Melbourne Cricket Ground (MCG).

v. Yu run weekly Powerball Lottery in Australia.

Questions

a) What assets are important for you to protect?

b) What security threats will you choose to defend against?

c) What countermeasures can you justify, in terms of costs and benefits?

Answer each of the above questions in the form of a bulleted list for each scenario, with brief justifications, assumptions (if any) or explanations as necessary. Please state any assumptions you made. Your explanations for each part should be approximately a 200 words in length. State any critical assumptions you decide to make. Your grade will be based on the thoroughness, realism, and thoughtfulness of your analysis.

Question 2 -

Consider an automated teller machine (ATM) in which users provide a personal identification number (PIN) and a card for account access. Explain with examples of confidentiality, integrity, and availability requirements associated with the system and, in each case, indicate the degree of importance of the requirement.

Question 3 -

You may have heard about different types of malware which are bad and do harm your computers and network systems. You should investigate FOUR different types of malware listed answering the questions below. In that way you could protect your computers and computer systems.

i. Virus

ii. Worms

iii. Trojan horse

iv. Spyware

Investigate each malware listed using following question. Write a summary about each using your findings to each question.

i. What is it?

ii. How can you get it (What is the source)?

iii. Who is capable of developing it?

iv. What harm can it do to your computer?

v. How can you protect your computer from each malware?

Reference no: EM131644042

Questions Cloud

Research an open source software project : Describe the open source software and how it works-Discuss the role this open source software has in management information systems
Why the icj should continue to be funded by the us : What would you say to educate the American public and Congress about why the reasons why the ICJ should continue to be funded by the US?
Discuss ability of individuals in underdeveloped nations : Consider strategies nurses can use to advocate for health care at the global level. What can one nurse do to make a difference
The un peacekeeping missions in east timor : List the most important accomplishments of the UN peacekeeping missions in East Timor and explain in your own words why those particular accomplishments.
What assets are important for you to protect : SIT 182 - Real World Practices for Cyber Security Assignment. You are the in-charge of Myki central sever at Melbourne. What assets important for you to protect
Discuss the change from process to outcomes : Discuss this in relationship to your area of concentration - practice and/or education. Elaborate the rationale behind the change from process to outcomes
Describe how each layer of the model represents : describe how each layer of the Model/Suite represents the communication flow between organizational levels - Using either the OSI Reference Model
Change means today in terms of individual freedoms : What would that change mean today in terms of individual freedoms? What would it mean in terms of public services?
Cost benefits to cloud computing : discuss whether or not there are cost benefits to cloud computing using specific examples. Be sure to include at least three reference sources.

Reviews

len1644042

9/15/2017 8:50:19 AM

Australian student, total 1200 words. Write answers to all the questions and create a PDF file. Submit the PDF file via Moodle link in Week 10 (Check the due date/time mentioned above). Clearly indicate the question numbers. If you have any questions regarding the answer length and others, please clarify them before the submission. After submission we will not be able to add marks for your negligence.

Write a Review

Computer Network Security Questions & Answers

  What are your thoughts on cyber criminals stealing

What are your thoughts on cyber criminals stealing healthcare records? What do you think is causing this sudden increase in medical record theft? In your opinion, what are some of Anthem's security weaknesses

  Evaluate the authentication protocols and methodologies

Evaluate the authentication protocols and methodologies within the wired and remote access environment and suggest improvement to secure authentication for GFI.

  When deciding on the proper architecture to run an

the data that organizations gather about their users can vary between strictly commercial information what books did

  Design a secure authentication technology for gfi

Identify and describe the organizational authentication technology and network security issues. Make a list of access points internal and external (remote). Design a secure authentication technology and network security for GFI

  Which displacement produces largest number of coincidences

Use displacements of 5 and 6. Which displacement produces the largest number of coincidences? Find the key. Find the plaintext.

  Describe the purpose of a ddos attack

Describe the purpose of a DDoS attack. How is a DDoS attack configured. How can DDoS attacks be detected and prevented. Research the internet for a DDoS attack. Describe the events.

  Discuss how this and other information security

write a 1400- to 2100-word paper that describes the security authentication process.discuss how this and other

  How would use address the given troublesome trend

How can one protect against virus outbreaks in an organization? What are the common causes of this problems? How would use address this troublesome trend?

  How you believe laws impact role of the system administrator

Describe, in your own words, how you believe these laws impact the role of the system administrator in an organization. Provide one specific example of when this might occur.

  How you could use one or more

Explain how you could use one or more of the Windows log files to investigate a potential malware infection on a system. What types of information are available to you in your chosen log file

  What steps you will take if your network has been hacked

Explain what steps you will take if you discover your network has been hacked. Your paper should be AT LEAEST A 1,000 words OF CONTENT and should include citations

  Determine whether x is even or odd

It can be shown that 5 is a primitive root for the prime 1223. You want to solve the discrete logarithm problem 5^x = 3 (mod 1223). Given that 3^611 = 1 (mod 1223), determine whether x is even or odd. Follow the below step for correct answers.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd