Discuss a situation where you received security education

Assignment Help Computer Network Security
Reference no: EM131097818

Discussion Questions

I.

Topic 1: CommonPort Scanning Techniques

Do some research on computer ports that are most often scanned by hackers. Identify a port scanning exploit that is interesting to you and share it with the class. If you have experienced or witnessed port scanning activity on a computer network, consider including this in your response as well.

Topic 2: Popular Reconnaissance Tools

Do some research and identify two popular reconnaissance tools. Compare and contrast your chosen reconnaissance tools and explain the benefits and limitations of each.

II.

Topic 1: Wireless

Research the Internet and published research to find a recent wireless exploit that is not discussed in the textbook. Provide a brief summary of the exploit and the threat that it poses to an organization. Also, identify a recommendation for how an organization can protect itself from the exploit.

Topic 2: Organizational Attacks

Websites continue to be a primary vulnerability to organizations. For example, SQL injection attacks have been understood for years, yet organizations continue to fall victim to such attacks. Why do you suppose this continues to be such an issue? Research a recent attack on an organization in which the attack occurred via a vulnerability in the organization's website (and related infrastructure). Describe the attack. What steps could the organization have taken to protect against such an attack?

III.

Topic 1: Hijacking Techniques

A variety of session hijacking techniques have been developed with new techniques continuing to be developed. Using the Kaplan library and the Internet, research session hijacking techniques. Select a session hijacking technique or threat and summarize the technique as well as the threat it presents to the person or organization being attacked. Be sure to include references to the source of your research and try to select a session hijacking technique that has not already been discussed.

Topic 2: Incident Response

Using the Internet, identify an incident where a company or other organization has suffered a security breach. Research the incident, paying particular attention to the way in which the organization responded to it. Post a summary of the incident, followed by your assessment of the organization's response. Did the company respond appropriately and in a timely manner? Why or why not? Be sure to cite the sources of your information.

IV.

Topic 1: User Security Education

You have probably received some form of information security education, either in your workplace, school, or other settings. Discuss a situation where you received security education. How was it delivered? How long did it take? How often, if ever, did you receive refresher or update training? Was the training effective? Why or why not? If you have never received such training, discuss what you think should be included in such training and why it would be effective?

Topic 2: System Hardening

System hardening is the term used to improve a system's security incrementally making it more and more difficult for a hacker to breach it. Research and discuss some best practices in system hardening. Describe any hardening approaches you have seen used, if any.

V.

Topic 1: IDPS Effectiveness

During the lab activity, you gained experience using SNORT. Based on that experience (and any other IDPS experience you have, if any), discuss the benefits and limitations you see with IDPS. What does IDPS do really well? What are some of its shortcomings, and how can those be addressed? Is there ever a situation where an organization would be justified in not using an IDS, IPS, or both? Respond to at least two of your peers' assessments of IDPS effectiveness, focusing on Discussion about why or why not an organization should dedicate some of its financial and human resources to the use of IDPS.

Topic 2: IT 542 Takeaways

Now that you are at the end of the course, consider the security of information you use, have access to, or for which you have stewardship. What have you learned in this class that will help you contribute to the security of that information? How can you help others also contribute to increased information security? Are there any activities that you think would qualify as ‘ethical hacking' that you could do relative to information you work with? If so, discuss.

Reference no: EM131097818

Questions Cloud

What is the range of all primitive data types : What is the range of all primitive data types. Default value (for fields/instance variable ) for any Object type is null. What is the Java API(Application Programming interface)?
Percentage cost of the preferred stock : Pangbourne Whitchurch has preferred stock outstanding. The stock pays a dividend of $10 per share, and sells for $50. What is the percentage cost of the preferred stock?
Caterpillar book debt-to-value ratio : What was Caterpillar's book debt-to-value ratio? (Enter your answer as a decimal rounded to 2 decimal places. Do not round intermediate calculations.)
What does milgram studies reveal about people tendencies : What does the Milgram studies reveal about people's tendencies to go against their own values in authority and what are the similarities and differences in meaning between the words "respect" and "obedience," in your thinking?
Discuss a situation where you received security education : You have probably received some form of information security education, either in your workplace, school, or other settings. Discuss a situation where you received security education. How was it delivered?
Essay on your approved business decision : Write an 1,050-word argumentative essay on your approved business decision in which you include the following:
Withdraw quarterly payments : How much should be originally placed in a trust fund in order to do the following? I want my daughter to be able to withdraw quarterly payments of $700 for 10 years. Money earns an annual rate of 8% compounded quarterly. (After the last withdrawal..
Blue currency unit and red currency unit : In the economy of Mungo, discussed in your workbook, there is a third person called Ike. Ike has a red income of 40 and a blue income of 10. (Recall that blue prices are 1 bcu [blue currency unit] per unit of ambrosia and 1 bcu per unit of bubblegum...
How would you test the validity of folk wisdom : How would you test the validity of this folk wisdom idea using the scientific method - Describe how you would conduct the research

Reviews

Write a Review

Computer Network Security Questions & Answers

  Consider a mac technique called cbc­mac

Consider a MAC technique called CBC­MAC. The algorithm takes a message, m, a secret key, k, and runs CBC mode encryption on the blocks of the message. For purposes of this problem the initialization vector will always be zero. The tag is the final..

  The discussion board db is part of the core of online

the discussion board db is part of the core of online learning. classroom discussion in an online environment requires

  Content of e-mail rightfully belongs to sender-receiver

Who does content of e-mail rightfully belongs to sender or receiver? Are security threats overblown? Present the example to support response.

  Identify a successful three-way handshake?

Identify a successful three-way handshake?

  Ethics or values within the hacking subculture.

Write a 1-2 page essay defining and showing examples of hacking and its subculture. Do hackers have ethics or values? If so, give examples of ethics or values within the hacking subculture.

  Present the project to the board of directors

Suppose the VoIP project sponsor wants you to present the project to the board of directors. Particularly, the sponsor would like you to discuss the quality of the project. It is worth noting that during the deployment of the VoIP system the quali..

  Explain the meaning the terms granularity

In reference to access control explain the meaning the terms "granularity". Discuss the trade-off between granularity and efficiency.

  Compute the entry in the rijndaels-box

Compute the entry in the RijndaelS-box

  How should organizations respond to security threats your

how should organizations respond to security threats? your response should be at least 200 words in length. you are

  Notes on is principles

Explain how information systems transform business operations of your selected business.Investigate how information systems affect business careers and what information systems skills and knowledge are essential.

  Access and read e-mail from government web sites

He wants to utilize a variety of electronic tablets to access and read e-mail from government web sites (Note: Coast Guard is dual-hatted -Department of Defense and Department of Homeland Security). He has been briefed on a variety of mobile devic..

  Identify an assessment of risks associated with collection

Identify and provide an assessment of the risks associated with collection, processing, and storage of confidential client information.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd