Advantages and disadvantages from a security perspective

Assignment Help Other Subject
Reference no: EM133730780

Question 1: Short Essay Answer (32 points). Please answer in your own words when possible and cite all sources of information. Respond to the following questions considering all the material we have studied in this class for the past 6 weeks. Be specific and fully explain and give reasons for your answer.

There has been reports from the news about a few fatal accidents where software bugs or vulnerabilities were the main source of the problem. For example, in the case of Boeing 737 MAX and 737 NG airplane Maneuvering Characteristics Augmentation System (MCASE) software. In this question we dive into software development lifecycle models and how software bugs can affect the security of the product if not followed properly.

Explain in detail all the software development lifecycle models (SDLC) we discussed in Session 1 and in addition for each of the models discuss the following:

A)What are the advantages and disadvantages from a security perspective?

B)What are the strengths and weaknesses of each model from a security perspective?

C)Provide an example scenario of where each one is used from a security perspective.

D)At what stage in the software development lifecycle is security implemented?

Question 2: Short Essay Answer (32 points). Please answer in your own words when possible and cite all sources of information. Respond to the following questions considering all the material we have studied in this class for the past 6 weeks. Be specific and fully explain and give reasons for your answer.

Defense Contractor Company X is hiring CyberSecurity experts to help with various security issues regarding their software and hardware teams. You apply to the Principal Cybersecurity position and get called for an in-person interview. The Director of operations schedules a meeting with his existing 30-person team and yourself. Half of the team is on the Contracts and Sustainment teams and half is on the Engineering team and they want to see what you can bring to the table. It is expected that the meeting will turn into a technical discussion and you are expected to brief both teams as expected because you are the Cybersecurity SME (Subject Matter Expert). Their software development team is using the Agile process and they want to add security to this process. The end goal is to reach maturity level 3.

From all the material we covered so far from Session 1 to 5, please provide a detailed answer and full explanation to these questions with enough supporting evidence that can justify full points credit.

A)What security methodology framework should they use to enforce security throughout the software development process?

B)What would you recommend for system network boundary protection from Cyberattacks?

C)What would you recommend for detection of vulnerabilities such as buffer overflows?

D)What would you recommend for C programming language static/dynamic analysis?

E)What would you recommend for wiping out a company mobile device if it gets lost or stolen?

Their hardware team is also trying to certify their Crypto hardware module to EAL 7 and the software team mentioned above is part of this effort as well. The Crypto module uses FIPS-140-2 type encryption algorithm and takes input from an unclassified system and sends the information to a classified system. They need an ATO (Approval to operate) and are in desperate need of a Cybersecurity expert that knows the RMF framework, this is where your expertise comes in. From all the material we covered so far from Session 1 to 5, please provide a detailed answer and full explanation to these questions with enough supporting evidence that can justify full points credit.

F)The Company Director asks - "Explain the RMF framework in detail"?

G)What are the 3 main documents that are required for an RMF evidence package, explain in detail?

H)He also asks, "How do we certify our Crypto module with concurrent certifications, I mean we have the Government ATO - C&A (now A&A) and the EAL 7 certification within almost the same time frame? Explain in detail.

I)Explain the EAL7 certification process in detail?

J)Explain in detail the Vulnerability assessment and analysis methodology you will conduct if we hire you?

Question 3: Short Essay Answer (36 points). Please answer in your own words when possible and cite all sources of information. Respond to the following, considering all the material we have studied in this class for the past 6 weeks. Be specific and fully explain and give reasons for your answer.

This is continuation from Question 2 above.

You think you did excellent after a good grilling the first day, but the Director was not quite convinced so he decides to bring you in for a second day to cover some more details on how you can help his other teams. This time, a red team of ethical hackers and pen testers gathered in the conference room. Some of them had a few sheets of paper with a lot of questions to choose from just waiting to ask you, but you are confident enough since you have all the experience required for the Principal Cybersecurity position, they are interviewing you for. The Director has a contract with DHS (Department of Homeland Security) and the FBI (Federal Bureau of Investigations) but some of the folks in his team do not have the higher-level clearances DHS and FBI needs but you do.

Please provide a detailed answer and full explanation to these questions with enough supporting evidence that can justify full points credit.

A)What details can you provide us regarding Chinese Malicious Cyber Activity?

Especially, Operation code name Cloud Hopper -

B)What details can you provide us regarding - North Korean Malicious Cyber Activity code name HIDDEN COBRA? Especially

Reference no: EM133730780

Questions Cloud

Develop two direct observation systems : Develop two direct observation systems, including data collection sheets and instructions, for collecting data on student behavior. Each observation system
Explaining the severity of the situation to the adolescent : Before explaining the severity of the situation to the adolescent, nurses should make every effort to help adolescents express their own feelings.
Creating a technical brief for the security or it director : Creating a technical brief for the security or IT director explaining how the situation informs the larger proactive adversarial detection plan they are writing
Should nurses help with physician assisted suicide : Should nurses help with physician assisted suicide? Should masks be required in schools? Should women's medical centers allow abortion?
Advantages and disadvantages from a security perspective : What are the advantages and disadvantages from a security perspective and What are the strengths and weaknesses of each model from a security perspective
How exactly each disadvantage may play out in organization : Provide at least one example of your own creation for how exactly each disadvantage may play out in a real organization and how it could hurt the organization.
Apply the bioethical decision making model : Apply the Bioethical Decision Making Model to the specific clinical ethical situation that you choose. Address each section of the model in your paper.
What is your analysis of the state of the field of change : What is your analysis of the state of the field of change management? Describe important issues or current dilemmas in the field.
Determining the presence of employee burnout : What factors should the vice-president consider in determining the presence of employee burnout? Do employees take more than 1.4 weeks of vacation

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd