Define typical attacks make reference to corresponding layer

Assignment Help Management Information Sys
Reference no: EM131261111

Security attacks on information systems occur all the time and pertain to every aspect of the attacked system. In other words the attacks are directed against all components of a system. The attackers look for the weakest links in each component and using various tools exploit the potential vulnerabilities. The first step in establishing a secure information system is to consider the potential threats and the corresponding attacks. Next, the risk or the probability of a threat to cause damage to an asset should be evaluated. Once the threat definition and risk analysis are performed, the appropriate solution of defense can be devised.

The purpose of this conference topic is to understand the prerequisite steps that should be taken for a successful implementation of security solutions. Read through Session 4 Lecture Notes, and become familiar with the issues of vulnerabilities. attacks and countermeasures at different layers. We will focus on typical attacks in the Internet affecting confidentiality, integrity and availability mainly on the lower four layers: Layer 1, Physical; Layer 2, Data Link; Layer 3, Network; and Layer 4, Transport.

Assignment:

Post your personal viewpoint upon the following issues:

Your boss is asking each engineer from all departments to come up with the one or two sources of network threats and attacks you consider the most critical and why. He wants you to be able to fit your thoughts on an index card. He does not care if the same problem is addressed from several points of view or if you address a very specific "threat of the day" or one from the past that could come back. You are also asked to have an opinion about the potential risks of such threats and attacks.

With limited time and resources your manager wants everyone to suggest the structure of a network defense system to protect the computers and the network. Since this is an open discussion if your favorite idea has been discussed "to death" pick the next. These are pro-active steps. Consider at least two solutions and why one ranks high on your mind.

Hint: When describe typical attacks make reference to the corresponding layer and the controls that are employed in that layer to minimize the attack or vulnerability that leads to the attack. For example, in the link layer, there is ARP spoofing and man-in-the-middle attacks. In the IP layer, there is packet sniffing. In the transport layer, there is the SYN flood attack causing Denial of Service. Be as complete as possible and cite your reference materials in your response. We have not talked much about the physical layer. In physical layer, for example, an attacker can cut a cable or jam a wireless signal affecting availability or wiretap affecting confidentiality. You may need to dig up sources on the physical layer security.

Reference no: EM131261111

Questions Cloud

Describe the basic cash management principles : What is the allowance to adjust short-term investments to market and why is it used?
What are the impacts of an exchange rate system : What are the impacts of an exchange rate system on exports and imports? Do you think it is better to source from overseas or should tariffs be in place to protect American industries? Why?
Power point presentation guidelines : You will to present detail on Four (4) Equal Employment Opportunity Laws, such as the Americans with Disabilities Act, Civil Rights Act of 1964, Equal Pay Act of 1963, Age Discrimination in Employment Act of 1967, Pregnancy Discrimination Act of 1..
Find the average number of customers waiting for haircuts : Find the average number of customers waiting for haircuts.-  Find the average number of customers in the shop.
Define typical attacks make reference to corresponding layer : With limited time and resources your manager wants everyone to suggest the structure of a network defense system to protect the computers and the network. Since this is an open discussion if your favorite idea has been discussed "to death" pick th..
Why do most companies have petty cash funds : What is the difference between the financing and operating cycles?
Working for government more attractive to college graduates : What could public employers do to make working for government more attractive to college graduates?
Describe two advantages of performing reconciliations : Describe the potential sources of difference between a cash account and its associated bank statement balance.
Compute the percentage of time that the machine is used : Compute the percentage of time that the machine is used, the average length of the queue and  The average number of students in the system.

Reviews

Write a Review

 

Management Information Sys Questions & Answers

  Perform basic eoq analysis for each item

Perform basic EOQ analysis for each item. - Classify the implant inventory items according to the ABC analysis.-  Calculate the yearly inventory management cost.

  Question about informaticswhat is the most challenging

question about informaticswhat is the most challenging issue often encountered when implementing more effective

  Iplementation of scm crm and erpassuming that you cannot

implementation of scm crm and erpassuming that you cannot implement crm erp and scm all at the same time how do you go

  Do you see technology progressing to the point

We often say that the hardware is the physical interface to a computer technology system while software is the intellectual interface. How is your hardware the physical interface and software , the intellectual interface to your computer?

  Discussion about preventing security breaches in businesses

Write a 350- to 700-word summary of the discussion about preventing security breaches in businesses

  Creating a culture of evidence-based practice

Creating a Culture of Evidence-Based Practice

  Question about global logistics and what are the challenges

question about global logistics and what are the challenges posed by global logistics? how can an organization meet

  Benefits of supply chain managementdiscuss the benefits of

benefits of supply chain managementdiscuss the benefits of supply chain management. how does the implementation of

  Examine five issues that the it department is likely to face

Examine five issues that the IT department is likely to face when it comes to supporting virtual teams. Describe five advantages and five disadvantages of using virtual teams for the organizations described in the scenario.

  Solve complex organisational problems theoretically

Solve complex organisational problems theoretically and practically and critically reflect on the effectiveness of management processes to real-world problems.

  Network architecture departmentyour instructor is tasked

network architecture departmentyour instructor is tasked with developing an updated it division in alignment with a

  The purpose of the term project is to explore an it

The purpose of the term project is for you to explore an IT topic of your choice. You may choose any IT topic, subject to instructor's approval.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd