Explain information security threats and vulnerabilities

Assignment Help Computer Network Security
Reference no: EM13810945

Watch the Information Technology Security for Small Businesses video from the National Institutes of Standards and Technology (NIST):

Information Technology Security for Small Business(https://www.youtube.com/embed/ajwX-7jVLo0)

Then write an information security white paper that can be used to market your firm's security consulting services to small businesses in the Washington, DC, area. Your white paper must:

  • Be concise-no more than three pages long.

  • Provide a general explanation of the business need for information security (protection measures) even in the smallest of businesses (e.g., protect against loss of profit, damage to company's reputation, costs of litigation, etc.).

  • Explain information security threats and vulnerabilities in plain English to small business owners who, while experts in their own business areas, have limited knowledge of computers, networks, and software.

  • Explain the following key concepts as part of the threats and vulnerabilities discussion:

    • confidentiality
    • integrity
    • availability
    • non-repudiation
    • authentication
    • authorization
    • risk
  • Recommend technologies, processes, and policies that can be used to solve or mitigate one of the following common information security threats:

    • data breach and/or data theft (confidential client information)
    • denial-of-service (DOS) attacks
    • insider theft of intellectual property
    • deliberate corruption of electronic files (hacker attack or malicious insider) including virus/worm infections
  • Discuss the impact or results that can be expected:

    • costs and benefits of effective protection measures
    • costs and penalties of ineffective or nonexistent protection measures.

Reference no: EM13810945

Questions Cloud

Summary of the following reading about international moneta : Summary of the following reading about  International Monetary Fund's Board of Governors In good times and in bad, the world is interconnected. Upticks in European markets affect traders in North America. Downturns on one side of the globe are felt w..
Find the velocity of the bomb when it hits the water : Find the velocity of the bomb when it hits the water - what is the deceleration of the bomb and what is the average force of impact?
Define occurrence of globalization in globalization debates : What is some of the evidence given for and against the occurrence of globalization in globalization debates. Which of the arguments do you find more convincing and why
How are these two objectives related : If the marginal cost of letting another vehicle across a bridge or travel through a tunnel is nearly zero, how should the MTA set tolls in order to maximize profit? In order to maximize toll revenue? How are these two objectives related?
Explain information security threats and vulnerabilities : Explain information security threats and vulnerabilities in plain English to small business owners who, while experts in their own business areas, have limited knowledge of computers, networks, and software
Summary on the following reading about business ethics : Summary on the following reading about business ethics: In today's cutthroat, corporate world of downsizing, mega mergers, and hostile takeovers, business and ethics often seem at odds. Companies have always had to pay attention to the bottom line.
Homeland security and crisis management planning : Homeland Security and Crisis Management Planning
Draw a free body diagram for the woman : Draw a free body diagram for the woman. What is the reading on the scale - What happens to the distance between the monkey and the bananas.
Document for a information system transformation : 4-6 pages Business Requirements Document for a Information System Transformation for a law firm and two other agencies a Security Firm; Investigation Firm all have seperate data base; I have to come up with how to create a centralized database

Reviews

Write a Review

 

Computer Network Security Questions & Answers

  Implementation issues for it security policy development

Examine the implementation issues for IT security policy development. Determine which of these issues are the most challenging for organizations to overcome and explain why.

  Network security

SLE, ARO, and ALE, behavioural biometric technology, Enterprise Information Security Policy, Issue Specific Security Policy, System Specific Security Policy, firewalls protect network, creating a DMZ during firewall implementation, use of SSL to se..

  How are students with exceptional needs

What is the impact of Common Core on education today? How are students with exceptional needs affected by this new initiative?

  What is the purpose of the diffie-hellman algorithm

Briefly compare and contrast how asymmetric cryptography is used to provide encryption as opposed to how it can be used to provide a digital signature.

  A firewall works by blocking incoming

A firewall works by blocking incoming requests. Explain how a firewall can distinguish between two incoming requests allowing one while denying the other??

  Review an article which focuses on the basics of

write 400-600 words that respond to the following questions with your thoughts ideas and comments. this will be the

  What is mac and what is discretionary access control

What is MAC and what is discretionary access control - Given Example on p. 69, draw the lattice diagram. Given two security levels, decide whether one dominates the other.

  Use the diffie-hellman public-key algorithm

You are Alice. You have agreed with your friend Bob that you will use the Diffie-Hellman public-key algorithm to exchange secret keys. You and Bob have agreed to use the public base g = 19 and public modulus p = 739.

  Cost-of-use issues are of client-dominant local area network

What technology and cost-of-use issues are associated with a client-dominant local area network? Think about what happens as the network grows in size.

  Describe the process used in restoring the scrambled bits

Describe the process used in restoring the scrambled bits and determine the legal and ethical considerations for investigating and prosecuting digital crimesanalyse data.

  Plan a high-level backup and disaster recovery plan

Plan a high-level backup and disaster recovery plan for a business. Discuss the security of the network and suggest best practices for securing the business network.

  Notes on is principles

Explain how information systems transform business operations of your selected business.Investigate how information systems affect business careers and what information systems skills and knowledge are essential.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd