Analyse the various approaches for mitigating security risk

Assignment Help Computer Network Security
Reference no: EM131332667 , Length: word count:1250

Task

Specific issues that you need to address in the forum discussions are provided within the first 3 topics. These questions are posed for you to reflect on in the form of written Discussion Board (forum) posts. As this is a postgraduate course, it is expected that your written responses will provide you an opportunity to express your personal and professional views. There are no correct answers, however the way you justify your answers with validated evidence is key to this activity. Post your forum entries as you are prompted within the topics. Your Subject Co-ordinator will respond to your first forum post, and monitor and moderate as required the remaining 2 posts.

You must curate, collect and save your responses in a word document to be submitted on EASTs. This activity's final mark will be provided prior to the final assessment item. Rationale As this is a graduate course, more is expected from students in the way of participation, and further as a graduate reading course, the opinions of students are actively sought to demonstrate that the reading material has been read, understood and provoked a response.

The readings on a given topic will in general not agree on all issues in the topic, such as the role and feasibility of cyber-insurance, and soliciting written responses from students gives an opportunity for expressing opinions from the professional experience of each student. Also being a distance course, regular posting on the forum promotes the cohesion of the cohort and a notion of group learning for this course.

This assignment is for students to meet parts of the following learning outcomes. Be able to critically analyse the various approaches for mitigating security risk, including when to use insurance to transfer IT risk; be able to critically evaluate IT security risks in terms of vulnerabilities targeted by hackers and the benefits of using intrusion detection systems, firewalls and vulnerability scanners to reduce risk.

1250 words

7 references

References -

1. Asgharpour, F., Liu, D., & Camp, L. J. (2007). Mental models of security risks. In Financial cryptography and data security : lecture notes in computer science (pp. 367-377). Berlin ; New York : Springer.

2. Day, K. (2003). Inside the security mind : making the tough decisions. (329 pages). Upper Saddle River, N. J : Pearson Education.

3. Perception of Risk

Author(s): Paul Slovic

Source: Science, New Series, Vol. 236, No. 4799 (Apr. 17, 1987), pp. 280-285

Published by: American Association for the Advancement of Science

Stable URL: https://www.jstor.org/stable/1698637.

Reference no: EM131332667

Questions Cloud

Long-term Financing Needed-what is total long-term debt : At year-end 2013, Wallace Landscaping's total assets were $1.6 million and its accounts payable were $450,000. Sales, which in 2013 were $2.2 million, are expected to increase by 20% in 2014.  What was Wallace's total long-term debt in 2013?  What we..
Watch the meth epidemic frontline video on the pbs : Watch "The Meth Epidemic" Frontline video on the PBS website.Write using 1 to 3 References to address the following questions/sections regarding Meth:Introduction,What is Meth?How does Meth use affect the individual, everyday life, and their family?W..
List the types of the two players at each state of the world : List the types of the two players at each state of the world in Y.- Can the beliefs of the players be derived from a common prior? If so, what is that common prior? If not, justify your answer.
Examine book-value balance sheet for university products inc : Examine the following book-value balance sheet for University Products, Inc. What is the capital structure of the firm on the basis of market values?
Analyse the various approaches for mitigating security risk : This assignment is for students to meet parts of the following learning outcomes. Be able to critically analyse the various approaches for mitigating security risk, including when to use insurance to transfer IT risk
Write a report about psychological support framework : Create your own psychological support agency to respond to a national catastrophic event (Wildfire, Tornados, Water Shortage, Flood, Mass Shooting, etc.)Write a report using 3 to 5 References that details the psychological support framework of your..
Situation presented by a state of the world : Construct a belief space in which the described situation is represented by a state of the world and indicate that state.
Write a refelection paper about the given case : The student will research and review five selected case studies and reflection on the case. Reflection will include summary information, outcome information and discussion as to how this case impacts the study of comparative crime and justice poli..
Construct a belief space : Construct a belief space in which the described situation is represented by a state of the world and indicate that state.

Reviews

len1332667

12/29/2016 3:01:05 AM

Specific issues that you need to address in the forum discussions are provided within the first 3 topics. These questions are posed for you to reflect on in the form of written Discussion Board (forum) posts. The written responses for each topic will be reviewed and assessed by the Subject Coordinator. Students will be evaluated on: Regular participation in forum activities Understanding of the topic Use of supporting evidence Written expression Constructive engagement in conversations to build learning community topics are attached in pdf files and words to be dived equally for each topic.

Write a Review

 

Computer Network Security Questions & Answers

  Discuss thoroughly vpns and how they are implemented

Discuss thoroughly VPNs and how they are implemented and Discuss both symmetric and asymmetric cryptographic algorithms. Also, explain cryptographic tools. Which should FDU consider

  Summerize the role of public key infrastructure

Summerize the role of Public Key Infrastructure (PKI). Discuss the use of a Certificate Authority (CA). Include the use of a CA and also include why the backing up of these keys is so important.

  Differences between terms security class and security level

Explain the differences between the terms security class, security level, security clearance, and security classification and What are two rules that a reference monitor enforces?

  Identify an assessment of risks associated with collection

Identify and provide an assessment of the risks associated with collection, processing, and storage of confidential client information.

  Iterative security management process

List the fundamental questions IT security management tries to address and list and briefly define the four steps in the iterative security management process.

  Largest threats against network security

Research and discuss what you believe are the largest threats against network security, and what measures should be taken to protect against such intrusions.

  Write a short paper outlining three broadband access network

Write a short paper outlining three broadband access networks and a few network management consideration for each.

  Media technologies affect social and societal issues

Any introduction of a new technology into a society initiates an endless series of effects, especially for those who have and use the technology compared with those who do not or cannot use the technology. Write a 1,400- to 1,750-word paper that a..

  What is cybersquatting

What is cybersquatting? (Chapter 4 MIS2) What does spoofing a website mean? (Class or online) What can a business do to prevent this from happening to it? Short answer (1 -2 paragraphs)

  Automating compliance with federal information security

Automating Compliance with Federal Information Security Requirements," on page 115 of the text Information Security: Contemporary Cases. Also, you will be creating a PowerPoint presentation that explains the information that you wrote in your p..

  What role does this play in international competitiveness

Can political risk be "managed"? If so, what methods can be used to manage such risk, and how effective are they? Discuss the lengths to which you would go to manage political risk relative to the kinds of returns you would expect to gain.

  Create and manage a photo album in facebook

Find and friend someone in Facebook. Create and manage a photo album in Facebook. Configure and customize your privacy settings in Facebook.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd