What is vulnerability and what makes a system vulnerable

Assignment Help Computer Network Security
Reference no: EM131325086

Assignment

Instructions

1. You just received a brand new computer for your home environment. It comes with the latest Operating System. You also have an Internet Service Provider where you can easily use the existing network to connect to the Internet and to perform some online banking. Describe the steps you plan to go through to ensure this system remains as secure as possible. Be sure to discuss the details of firewall settings you plan to implement within your operating system, browser privacy settings, and recommended software (e.g., Anti-virus and others) you will install. Also, describe your password strength policy you plan to adopt, and what you envision to do to ensure your online banking site is encrypted and using the proper certificates. Discussion of operating system patches and application updates should also be included. As you discuss these steps, be sure to justify your decisions bringing in possible issues if these steps are not followed. You can discuss this for a specific type of computer (e.g. MAC or PC) to make the scenario more appropriate for your environment.

2. Your son, who just turned 13, wants to join Facebook and post his picture and contact information on the site. Assuming, you are willing to allow him to have a Facebook account, describe what types of guidelines you would discuss with him to ensure his privacy and security are protected. Be sure to justify your decisions by describing possible issues if your guidelines are not followed.

• Prepare a well-written APA style paper, no more than 10 pages in length, addressing each of the above scenarios. Be sure to clearly separate the scenarios into separate sections of the paper. Only one paper is needed to address both scenarios.

Submission requirements:

Your completed assignment should be saved as a Word document and submitted to your LEO assignments area no later than the due date listed in the syllabus. Your document should be neat, well-written with minimal grammatical and spelling errors. Your name should be clearly listed on the first page along with the class/section, professor and due date. Your document should contain page numbers at the bottom of each page. Single or double space line formatting is acceptable.

Simple Guide for the final project.
Introduction

• Introduction
• Threats and Vulnerabilities

• What is threat?, malware are threats to computers.
• What is vulnerability? What makes a system vulnerable?.
• Threats compromise systems that have vulnerabilities

• Malware - define

• Virus - define
• Worms - define
• Trojans
• Phishing
• Spyware

• Web browser security.

• Social media
• Secure browsing
• Cookies
• Browser privacy

• Security Measures (you can list and discuss or define few of them).

• Firewall - helps block threat from outside and protect you from malicious sites
• Anti-virus software - this helps to mitigate malware threats and minimizes malware exploitation of known vulnerabilities
• Spyware protection
• SSL and Certification
• Apply proven patch management system
• Hiding SSID for wireless router so that hackers do not know its existence.
• Other security measures

• Authentication and Authorization

• Username to enter
• Password creation and criteria (strong vs weak password)

• Conclusion

• Facebook

- Background
- Rules to follow

- What is uploaded stays there
- Don't post what will compromise your dignity
- Privacy Security settings
- Who to befriend
- Scamming
- Phishing
-

• Conclusion

- In conclusion, make sure you don't introduce any new topic or information not discussed in the paper

• References.

Reference no: EM131325086

Questions Cloud

Rules of the diffusion of innovation : Consider Kotter's eight-stage model of change. How does it compare to Berwick's rules of the diffusion of innovation
How characteristics of mncs can affect the cost of capital : From an investor's standpoint, have small companies, in general over the past, been more profitable than their larger brethren?
What are the total costs–order costs plus carrying costs : Economic Order Quantity. Micro-Encapsulator Corp. (MEC) expects to sell 7,200 miniature home encapsulators this year. The cost of placing an order from its supplier is $250. Each unit costs $50 and carrying costs are 20% of the purchase price. (Pleas..
Normal hormonal control of male sexual development : 1) Explain the normal hormonal control of male sexual development by the hypothalamus pituitary-gonadal axis. 2) Are there other hormones that might influence reproductive maturation? Which ones and how do they affect growth and development?
What is vulnerability and what makes a system vulnerable : What is threat?, malware are threats to computers. What is vulnerability? What makes a system vulnerable?. Threats compromise systems that have vulnerabilities
Explain an mncs strategy of diversifying projects : Do you think that a full country risk analysis can replace a capital budgeting analysis of a project in a foreign country? Why
Summary of what the judges decided in the case : Read the ONE you chose and then write a 500 word or more summary of what the judges decided in the case.  Your summary should include: (1) a short explanation of the facts leading up to the dispute
The aforementioned terms merger vs acquisition vs takeover : In your own words, please explain the difference between each of these terms: Merger .vs. Acquisition .vs. Takeover. Please provide a detailed example of how Amazon has engaged in one of the aforementioned terms (merger, acquisition, or takeover).
Country risk analysis for the foreign country : Once a project is accepted, country risk analysis for the foreign country involved is no longer necessary, assuming that no other proposed projects are being evaluated for that country. Do you agree with this statement?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Controversial topic in recent media stories

The escalation in computer crime is becoming an increasingly controversial topic in recent media stories. However, the way in which cybercrime is handled differs depending upon the country that has jurisdiction.

  How the virus was able to replicate onto remote servers

Create a graphic rendering of how the virus was able to replicate onto remote servers using Visio or an equivalent such as Dia. Note: The graphically depicted solution is not included in the required page length.

  Strong ciphers produced by the enigma machine

Concur with, dispute, or qualify following statement: "The strong ciphers produced by Enigma machine are  result of complex mathematical trapdoor functions used to encrypt messages."

  How asymmetric cryptography is used to provide encryption

Briefly compare and contrast how asymmetric cryptography is used to provide encryption as opposed to how it can be used to provide a digital signature.

  What will be public values transmit for commuication

Alice and Bob choose the numbers 6 and 10 privately. What will be the public values they transmit and what would be the final secret computed?

  Element sequences of running shellsort

1. Show the order of the steps to sort {3, 1, 4, 1, 5, 9, 2, 6} using Mergesort algorithm. 2. Show the element sequences of running Shellsort on the input {9, 8, 7, 6, 5, 4, 3, 2, 1} at the increments {7, 3, 1}, respectively.

  How message segmentation can reduce end-to-end delay

What do you think is the best choice of N from an efficiency standpoint? Does your answer change depending on the value of tprop?

  Examine the different levels of security

Examine the different levels of security and how an organization can provide the proper level of effort to meet each information security need and how this relates to what is in an organization's information security policy

  Identify the critical business functions

Identify the Critical Business Functions (CBFs) a midsized organization would need to restore after a catastrophic failure occurs, and suggest the ways the organization would determine the order in which it restores its CBFs.

  Cryptographic operations with gpg

COIT20262 - Advanced Network Security - Describe the meaning of a rule conflict and explain one method that a malicious user could use to avoid detection by your rules.

  Practice for organizations to maintain a special room

It is common practice for organizations to maintain a special room to install and store network equipment. Is this practice necessary? What are the benefits, if any?

  Digital stratigraphy

concept of Message Digest, File Carving, MD5, Locard's Exchange, Parker's categories, computer-related crime as suggested by Donn Parker, computer systems as sources of digital evidence

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd