Developing a secure information system

Assignment Help English
Reference no: EM131689500

Developing a secure information system

Actions for 'Developing a secure information system'

Subscribe Hide Description

Security attacks on information systems occur all the time and pertain to every aspect of the attacked system. In other words the attacks are directed against all components of a system. The attackers look for the weakest links in each component and using various tools exploit the potential vulnerabilities. The first step in establishing a secure information system is to consider the potential threats and the corresponding attacks. Next, the risk or the probability of a threat to cause damage to an asset should be evaluated. Once the threat definition and risk analysis are performed, the appropriate solution of defense can be devised.

The purpose of this conference topic is to understand the prerequisite steps that should be taken for a successful implementation of security solutions. Read through Session 4 Lecture Notes, and become familiar with the issues of vulnerabilities. attacks and countermeasures at different layers. We will focus on typical attacks in the Internet affecting confidentiality, integrity and availability mainly on the lower four layers: Layer 1, Physical; Layer 2, Data Link; Layer 3, Network; and Layer 4, Transport.

Assignment:

Post your personal viewpoint upon the following issues:

  • Your boss is asking each engineer from all departments to come up with the one or two sources of network threats and attacks you consider the most critical and why. He wants you to be able to fit your thoughts on an index card. He does not care if the same problem is addressed from several points of view or if you address a very specific "threat of the day" or one from the past that could come back. You are also asked to have an opinion about the potential risks of such threats and attacks.
  • With limited time and resources your manager wants everyone to suggest the structure of a network defense system to protect the computers and the network. Since this is an open discussion if your favorite idea has been discussed "to death" pick the next. These are pro-active steps. Consider at least two solutions and why one ranks high on your mind.

Hint: When describe typical attacks make reference to the corresponding layer and the controls that are employed in that layer to minimize the attack or vulnerability that leads to the attack. For example, in the link layer, there is ARP spoofing and man-in-the-middle attacks. In the IP layer, there is packet sniffing. In the transport layer, there is the SYN flood attack causing Denial of Service. Be as complete as possible and cite your reference materials in your response. We have not talked much about the physical layer. In physical layer, for example, an attacker can cut a cable or jam a wireless signal affecting availability or wiretap affecting confidentiality. You may need to dig up sources on the physical layer security.

Reference no: EM131689500

Questions Cloud

Define and apply the four steps of the marketing process : List and briefly describe the 4 P's of marketing, relating them to customer service.Define and apply the concept of brand image to an organization.
Facilitate governmental access to such data : To what degree should these companies facilitate governmental access to such data?
Estimate the proportion of households for telephone line : The telephone company wants to estimate the proportion of households that would purchase an additional telephone line if it were made available.
Define the different components of the application : Define the different components of the application (Default.aspx, Helper and Database Context) and explain the relation between them.
Developing a secure information system : Security attacks on information systems occur all the time and pertain to every aspect of the attacked system.
Statement of the goal or the change you want to make : Discuss why this goal or change is important to you and how it will help you improve your life
Find the domain and range : SIT194 - find the domain and range and find a restriction of the domain such that the function is one-to-one - Find the volume formed when the area above
What are your thoughts on the leaders response : What are your thoughts on the leader's response? How you could implement their thinking in your own career?
Research at least three relevant individual ob issues : Research at least three relevant individual OB issues to discuss at the conference

Reviews

Write a Review

English Questions & Answers

  Write a profile

Write a profile on bishop poleni.

  Education system

Write a rearch paper on education system

  Write an report

The U.S. President Barack Obama said America can "win the future" by rebuilding its manufacturing sector (on June 8, 2011, after visiting an automotive training center at a community college in Virginia, outside Washington). Do you agree, and why?

  Discuss the accuracy of this statement

'Consideration does not have to be adequate or commercially realistic, nor does it need to be expressed in monetary terms, it merely needs to be "sufficient".' Discuss the accuracy of this statement.

  Write an essay on the youngest billionaire

Write an essay on the youngest billionaire

  Transformational leadership in the public sector

The more hierarchical an organization's authority structure, the lower the reported practice of transformational leadership behaviors.

  Modal verbs or modal constructions

Identify all the modal verbs or modal constructions in the passage

  Write a latter to mom thanking to adopting and caring

Write a latter to mom thanking for adopting and caring,

  Ways of knowing & authority in your discipline

To explore and become familiar with your discipline; to prepare you for your major researched essay.

  Writing an effective business letter

Prepare a letter in either block or modified block format, addressed to your employer or supervisor and copied to your marker.

  Discuss the kingdom of saudi arabia

Discuss the Kingdom of Saudi Arabia

  Developing an annotated bibliography

Developing an annotated bibliography

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd