Define typical attacks make reference to corresponding layer

Assignment Help Management Information Sys
Reference no: EM131261111

Security attacks on information systems occur all the time and pertain to every aspect of the attacked system. In other words the attacks are directed against all components of a system. The attackers look for the weakest links in each component and using various tools exploit the potential vulnerabilities. The first step in establishing a secure information system is to consider the potential threats and the corresponding attacks. Next, the risk or the probability of a threat to cause damage to an asset should be evaluated. Once the threat definition and risk analysis are performed, the appropriate solution of defense can be devised.

The purpose of this conference topic is to understand the prerequisite steps that should be taken for a successful implementation of security solutions. Read through Session 4 Lecture Notes, and become familiar with the issues of vulnerabilities. attacks and countermeasures at different layers. We will focus on typical attacks in the Internet affecting confidentiality, integrity and availability mainly on the lower four layers: Layer 1, Physical; Layer 2, Data Link; Layer 3, Network; and Layer 4, Transport.

Assignment:

Post your personal viewpoint upon the following issues:

Your boss is asking each engineer from all departments to come up with the one or two sources of network threats and attacks you consider the most critical and why. He wants you to be able to fit your thoughts on an index card. He does not care if the same problem is addressed from several points of view or if you address a very specific "threat of the day" or one from the past that could come back. You are also asked to have an opinion about the potential risks of such threats and attacks.

With limited time and resources your manager wants everyone to suggest the structure of a network defense system to protect the computers and the network. Since this is an open discussion if your favorite idea has been discussed "to death" pick the next. These are pro-active steps. Consider at least two solutions and why one ranks high on your mind.

Hint: When describe typical attacks make reference to the corresponding layer and the controls that are employed in that layer to minimize the attack or vulnerability that leads to the attack. For example, in the link layer, there is ARP spoofing and man-in-the-middle attacks. In the IP layer, there is packet sniffing. In the transport layer, there is the SYN flood attack causing Denial of Service. Be as complete as possible and cite your reference materials in your response. We have not talked much about the physical layer. In physical layer, for example, an attacker can cut a cable or jam a wireless signal affecting availability or wiretap affecting confidentiality. You may need to dig up sources on the physical layer security.

Reference no: EM131261111

Questions Cloud

Describe the basic cash management principles : What is the allowance to adjust short-term investments to market and why is it used?
What are the impacts of an exchange rate system : What are the impacts of an exchange rate system on exports and imports? Do you think it is better to source from overseas or should tariffs be in place to protect American industries? Why?
Power point presentation guidelines : You will to present detail on Four (4) Equal Employment Opportunity Laws, such as the Americans with Disabilities Act, Civil Rights Act of 1964, Equal Pay Act of 1963, Age Discrimination in Employment Act of 1967, Pregnancy Discrimination Act of 1..
Find the average number of customers waiting for haircuts : Find the average number of customers waiting for haircuts.-  Find the average number of customers in the shop.
Define typical attacks make reference to corresponding layer : With limited time and resources your manager wants everyone to suggest the structure of a network defense system to protect the computers and the network. Since this is an open discussion if your favorite idea has been discussed "to death" pick th..
Why do most companies have petty cash funds : What is the difference between the financing and operating cycles?
Working for government more attractive to college graduates : What could public employers do to make working for government more attractive to college graduates?
Describe two advantages of performing reconciliations : Describe the potential sources of difference between a cash account and its associated bank statement balance.
Compute the percentage of time that the machine is used : Compute the percentage of time that the machine is used, the average length of the queue and  The average number of students in the system.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Evaluate the reason for the limited use of root in linux

Evaluate the reason for the limited use of the root or superuser account in Linux. Determine why you believe, by default, this account is so cautiously guarded in comparison to Windows operating systems. Provide a rationale with your response.

  Why did facebook decide to make it more difficult for users

Why did Facebook decide to make it more difficult for users to control who has access to the personal information they post on the Web site?

  Write a report on social media and erp system

write a report on Social Media and ERP System

  Describe the purpose of learner assessments

Using appropriate citations and references, explain how the empirical findings presented in the assigned articles suggest the importance of applying self-regulation and metacognitive strategies to one's own learning. Describe the purpose of learne..

  Discuss the benefits of data management

Analyse the role of strategic alignment between goals and objectives and the technology that facilitates the achievement of theseobjectives. How could alignment be improved?

  List the entities and their attributes

A common business document is and order form. Orders are an integral part of any sales data base. List the entities and their attributes

  How should organizations respond to security threats

How should organizations respond to security threats and Discuss some human safeguards for employees that can ensure the security of information systems

  Economic production limiting the number of unitswhy would

economic production limiting the number of unitswhy would companies limit the number of units produced? does this

  Description of information systemwhat do you all think an

description of information systemwhat do you all think an information system that enables all the business departments

  What is an example of how integrating with the use of erp

What is an example of how integrating with the use of enterprise resource planning (ERP) can help an organization, from research or your own personal experience

  Identify potential physical threats that require attention

Explain in detail the security controls (i.e., administrative, preventative, detective, and corrective) that could be implemented to protect from the five (5) selected logical threats.

  Design your database including the creation of an erd

Continue working on your Learning Team Database and Presentation due in Week Four. Design your database including the creation of an ERD, identifying primary and foreign keys, determining the appropriate types for database attributes, determining..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd