Thursday, January 2, 2020

Final Security and Network - 3275 Words

Table of Contents Instructions 3 Honor Pledge 3 ABC Background 4 Question One Answer 5 Question Two Answer 8 Question Three Answer 10 Question Four Answer 11 Question Five Answer 12 Reference Page 14 CSEC 630 Final Exam - 100 points Exam is due by 11:59 PM EDT [Sunday December 02, 2012]. This examination is worth 20 percent of your total grade. There are five questions, and the maximum point values are included with each question. Maximum length answer for each question should be limited to approximately 800 words (2 pages) excluding diagrams,†¦show more content†¦(40 points) A threat is defined as â€Å"a potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm† (Stallings Brown, 2008, p. 13). In essence a threat is a possible danger that may reveal vulnerabilities. There are many threats associated with online services especially when you add in personal information. The first threat to ABC Healthcare that should be identified is the â€Å"continued development and propagation of viruses and worms† In the development phase of the network design program managers has to ensure not only that there will be antivirus software which will be ran continuously (maybe a network scan done daily after hours) but also ensure there are intrusion prevention and intrusion detection systems (IPS/IDS) in place that would identify network intrusions. A simple antivirus software like McAfee is easy to use and will not drastically increase their budget which in m y opinion would be the first balanced approach. Although they may have to pay a little more for other services to ensure a proper IPS or IDS many companies (including the Navy, uses SNORT which is an open source product). Another area that will have to be identified deals with both trusted users and untrusted users and that is unauthorized disclosure which in essence is the ability for someone to gainShow MoreRelatedLiterature Review of Mediation and Advocacy1698 Words   |  7 PagesBobbie Cecchini University of Phoenix Literature Review of Mediation and Advocacy Literature Review of Mediation and Advocacy in Human Services Field. This paper will review the following three areas: The Final Exit Network, Crime Victims, , and Social Security Disability Advocacy. Additionally, we will explore the information which is available and links to mediation and advocacy to the human services field. This paper will discuss the strengths and weaknesses of each site, theRead MoreTesting And Acceptance Of A Factory Acceptance Test Essay1675 Words   |  7 PagesThe FAT plan shall be included and supplied as part of the 100% design review. The Supplier shall submit to FPL for approval, the exact testing procedure and detailed test cases intended for use. Following FPL review, the Supplier shall submit a final test procedure, test cases and schedule. The FAT plan shall include a detailed written plan based on prior projects but adequately modified for this scope. The FAT plan shall also include a schedule along with sign-off sheets for all key steps ofRead MoreSecurity Issues Dealing With Metadata1166 Words   |  5 Pag esSecurity Issues Dealing with Metadata Most companies and government agencies are collecting and storing massive amounts of information dealing with all aspects of everyday life. This information ranges from an individual’s movements, captured on a city’s traffic cams, to details of what someone purchased at the local grocery store. Most of the information is random and anonymous however, there may be large amounts of personally identifiable information (PII) such as email addresses, birth datesRead MoreProject Management : Project Monitoring1026 Words   |  5 Pagesproperty management and acquisition employees. During the rollout phase of the centralized learning network, the project team encountered a system failure within management offices. After the project’s software team corrected rollout deviation through project monitoring and is in the process of beginning to bring remote offices online. This paper will address Briargrove centralized learning network CLN project monitoring aspects star t with a plan, report to management, make recommendations and checkRead MoreHow The Current Restaurant Location Continues Working On A Final Business Plan Punch Out1553 Words   |  7 Pagesreality and have begun working on a final business plan punch-out. Michael and Tyler are reviewing their marketing, promotion, and campaign plans for the grand opening. They are in agreement that this business plan is heading in the correct direction, they have the media, website and social media venues ready to go and they are feeling comfortable to begin the soft opening to test this plan out. Michael and Tyler meet with their staff to conduct a final walk-through with the contractorsRead MoreA Brief Note On The Security Of Information1445 Words   |  6 Pagesstorage of information in computer or computer network has become more efficient in maintenance, quick access of information, long life storages. Besides these advantages, there are also some challenging criteria in information digitalization. One of the major and major criteria is the security of that information. This Security of the information plays a major role in the business and its continuity. Not only in the areas of business, is security of information need and necessity for every individualRead MoreCloud Computing Case Study883 Words   |  4 PagesCloud Computing:- Cloud computing is used to connect ‘n’ number of computers to a single network and gaining different level of access across the world. It is used to reduce the IT infrastructure because it provides different type of services like servers, storage, databases, networking, software, analytics, and so on over the Cloud Computing. In present world we have different type of cloud computing like Amazon Web Services, IBM, and Salesforce etc. with different specifications which are requiredRead MoreMobile Apps : An App Essay1314 Words   |  6 Pagesmade towards medical services. One final example that delivers information of the government to the public is the Speed Test app. The Speed Test app permits users to precisely determine their overall mobile broadband performance. The app will offer the user a further in-depth assessment of all performance factors on the user’s device. Such factors include download and upload speeds, inactivity, and packet damage for the de vice. A mobile and wireless security reference point document was issuedRead MoreTelecommunication Is The Electronic Transmission Of Signals Used For Communication Sent Via Means Of Telephone, Radio, And1423 Words   |  6 Pagesthe proper setup it is possible for a company to communicate with any business and affiliates quickly just about anywhere in the world. To fully understand telecommunications it is important to understand the characteristics of telecommunication, network types, and the medium used in telecommunications. 2. Abstract Basic telecommunication characteristics are the medium that carries transmitted messages from point ‘A’ to point ‘B’. There is the simplex channel which is a communications channel thatRead MoreWhat Happened? At The Height Of The Christmas Season961 Words   |  4 PagesWhat happened? At the height of the Christmas season in 2013 Target was hacked. Up to 70 million customers were affected. How did this occur? According to Krebs on Security, sometime before November 27 attackers installed malicious software on point-of-sale (POS) devices in the checkout lines at Target stores. This software grabbed customer data that was stored briefly in the POS devices when the cards were swiped. It then cloned the cards and shopped for high-priced merchandise at other stores

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.