What assets are important for you to protect

Assignment Help Computer Network Security
Reference no: EM131644042 , Length: word count:1200

Real World Practices for Cyber Security Assignment

Question 1 -

Consider the following scenarios. Imagine that you are the in-charge of the security in each scenario. Explain how would you apply concepts of computer security to create a safer atmosphere by answering the questions below.

Scenarios

i. You are the in-charge of the Myki central sever at Melbourne.

ii. You manage the email server for a major election campaign.

iii. You are grading homework submissions for a class of 360+ students.

iv. You are the network administrator of the Melbourne Cricket Ground (MCG).

v. Yu run weekly Powerball Lottery in Australia.

Questions

a) What assets are important for you to protect?

b) What security threats will you choose to defend against?

c) What countermeasures can you justify, in terms of costs and benefits?

Answer each of the above questions in the form of a bulleted list for each scenario, with brief justifications, assumptions (if any) or explanations as necessary. Please state any assumptions you made. Your explanations for each part should be approximately a 200 words in length. State any critical assumptions you decide to make. Your grade will be based on the thoroughness, realism, and thoughtfulness of your analysis.

Question 2 -

Consider an automated teller machine (ATM) in which users provide a personal identification number (PIN) and a card for account access. Explain with examples of confidentiality, integrity, and availability requirements associated with the system and, in each case, indicate the degree of importance of the requirement.

Question 3 -

You may have heard about different types of malware which are bad and do harm your computers and network systems. You should investigate FOUR different types of malware listed answering the questions below. In that way you could protect your computers and computer systems.

i. Virus

ii. Worms

iii. Trojan horse

iv. Spyware

Investigate each malware listed using following question. Write a summary about each using your findings to each question.

i. What is it?

ii. How can you get it (What is the source)?

iii. Who is capable of developing it?

iv. What harm can it do to your computer?

v. How can you protect your computer from each malware?

Reference no: EM131644042

Questions Cloud

Research an open source software project : Describe the open source software and how it works-Discuss the role this open source software has in management information systems
Why the icj should continue to be funded by the us : What would you say to educate the American public and Congress about why the reasons why the ICJ should continue to be funded by the US?
Discuss ability of individuals in underdeveloped nations : Consider strategies nurses can use to advocate for health care at the global level. What can one nurse do to make a difference
The un peacekeeping missions in east timor : List the most important accomplishments of the UN peacekeeping missions in East Timor and explain in your own words why those particular accomplishments.
What assets are important for you to protect : SIT 182 - Real World Practices for Cyber Security Assignment. You are the in-charge of Myki central sever at Melbourne. What assets important for you to protect
Discuss the change from process to outcomes : Discuss this in relationship to your area of concentration - practice and/or education. Elaborate the rationale behind the change from process to outcomes
Describe how each layer of the model represents : describe how each layer of the Model/Suite represents the communication flow between organizational levels - Using either the OSI Reference Model
Change means today in terms of individual freedoms : What would that change mean today in terms of individual freedoms? What would it mean in terms of public services?
Cost benefits to cloud computing : discuss whether or not there are cost benefits to cloud computing using specific examples. Be sure to include at least three reference sources.

Reviews

len1644042

9/15/2017 8:50:19 AM

Australian student, total 1200 words. Write answers to all the questions and create a PDF file. Submit the PDF file via Moodle link in Week 10 (Check the due date/time mentioned above). Clearly indicate the question numbers. If you have any questions regarding the answer length and others, please clarify them before the submission. After submission we will not be able to add marks for your negligence.

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd