Explain areas of information technology as a metric

Assignment Help Basic Computer Science
Reference no: EM13761789

Part 1

"Security Objectives" Please respond to the following:

· The confidentiality, integrity, availability (CIA) triad represents generic security goals. CIA is typically applied to specific areas of information technology as a metric or guideline for establishing or maintaining security. Apply CIA principles to email technology. Explain in detail how each of the three components of CIA can be satisfied in a typical email transaction from one user to another. Be sure to include specific technologies involved (such as digital certs, signed certs, encryption, etc.).

· Security today, in one way or another, depends on trust relationships. Describe two scenarios in which the trust relationship between a user (client) and e-Commerce site (server) may be violated after being granted digital certificates from the same certificate authority (CA). Also, determine some possible mitigation steps.

Part 2

"Necessary Filtering " Please respond to the following:

· Analyze in detail a non-stateful firewall's interaction with the transmission control protocol / Internet protocol (TCP / IP) stack as a packet arrives from an internal (trusted) interface and is destined for a network on its external interface. Describe the details of the decision-making process.

· As you may already be aware of by now, port 80 traffic possesses one of the largest security threats in the IT industry today. This is evident since in today's world the Internet is so powerful and is used for so many different purposes within any organization that it cannot be completely taken out of the picture. Explain in detail how a Web proxy might be used to detect malware from entering or leaving organizations.

Reference no: EM13761789

Questions Cloud

Diesel engine designer watches can be extremely sturdy : Diesel engine is surely an Italian firm as their principal earnings emanates from offering apparel. These are renowned pertaining to Skinny jeans and also other equipment which have been geared towards diesel watches impacting your junior. The cor..
Encryption requirements as stated in the law : Identify ONE law, either a US Federal Law or a US state law, that requires the use of encryption to protect either consumer or corporate information from unauthorized disclosure. Write a 150+ word plain English summary in which you address the fol..
Program reads the contents of employees : Design a program that reads the contents of the employees.dat file and prints all the data within it. Format the report as designated in the Printer Spacing Chart below.
Ethical issues in information systems : Ethical Issues in Information Systems- Choose one (1) ethics issue, You may also use the Internet or the Strayer Library to research articles on ethical issues in information systems and choose one (1) ethics issue of interest to you
Explain areas of information technology as a metric : The confidentiality, integrity, availability (CIA) triad represents generic security goals. CIA is typically applied to specific areas of information technology as a metric or guideline for establishing or maintaining security.
Network implementation plan : Network Implementation Plan-After a network has been installed and becomes operational, the system must be maintained. An important part of an implementation plan is preparation for the operation of the network and the potential problems that migh..
Display the commands : Display the commands(s) used to do the following (and show the results): see the df command to view file system use in megabytes.
Research organizational benefits of using databases and dbms : Research organizational benefits of using databases and DBMS's. Supplement your research with a review of your lessons. Post a response to the discussion board: Respond to the following statements and, if appropriate, include personal experience as..
Crime and ethics based problems : Some violations, although technically a crime, may be referred to as an administrative violation, which involves fines.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  City number two

City Number Two

  Write a gui-based program that analyzes a round of golf

Write a GUI-based program that analyzes a round of golf. You will retrieve the data for 18 holes from a text file. On each line in the file will be the par for that hole (3, 4, or 5) and your core for that hole should be displayed in a label. Prov..

  Important considerations in the design of performance

What are some of the important considerations in the design of performance benchmarks for mobile devices? Why?

  Write the recursive function c++

write main program that uses the sumbits function to compute the number of bits in the unsigned long integer, and illustrates the work of the show bits function.

  Design an e?cient algorithm to handle a sequence

Design an e?cient algorithm to handle a sequence of such operations.

  Describe in 200 to 300 words at least two different ways to

explain in 200 to 300 words at least two different ways to secure a wlan. what are the ramifications if a wlan is

  Difference in tossing a fair coin to get half-and-half hs-ts

When we toss a fair coin, we expect that we get roughly half-and-half Hs and Ts. Of course, this might not happen in general: the question is, how bad can the difference get?

  Can a computer system function without one of these element

- What purposes do CPUs, memory and I-O devices individually serve in a computer system? - How do these 3 elements work together to compute? - Can a computer system function without one of these elements?

  What is the result of the following command

Sometimes when writing code, we need to cast a data type to a different data type. For example, you might need to change an int to a double or vice versa.

  Explain decision support systems

Decision support systems: Modeling and Analysis question - Why are models not used in industry as frequently as they should or could be?

  Find pythagorean triplets

Given an array of integers, find Pythagorean triplets. i.e. find a,b and c which satisfies a^2 + b^2 = c^2 Integers could be positive or negative.

  What is the decimal value

assume that the following 10 bit numbers represents sighned integers using sign/magnitude notation. the sign is the leftmost bit and the remaining 9 bits represent the magnitude. What is the decimal value for 100000000.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd