Difference between an insider attack and an outsider attack

Assignment Help Computer Network Security
Reference no: EM13863928

Write the questions followed by your answers.

1) You are in charge of IT assets for a company. You are attending a meeting with your management to address questions and concerns around security for the organization. You are the featured presenter at the meeting. The meeting starts in a somewhat unstructured fashion and you are presented with the following questions.

You need to provide an answer for each of the 5 following questions. After you answer these questions you can move to the 2nd part of the presentation.

a) We have never had an attack. Why are you so concerned now?

b) How would we determine what assets we have, what needs to be protected, and how to protect them?

c) I have heard we need a written security policy. Why would we need a written policy? How often would we need to revise it? Who in the organization would need to be involved in this process?

d) What is the difference between an insider attack and an outsider attack?

e) What is this defense in depth approach to security that we keep hearing about?

2) You are in charge of the IT assets for your company. How do you make the case to your management that investing the time and money into malware protection is money well spent?

For this question you need to write an outline for a presentation you are going to make to management to persuade them to invest in malware protection. The approach to the presentation needs to be factually persuasive. In other words, you need to provide an outline that will demonstrate to management through empirical evidence, business acumen, technology trends and project planning why investing in malware protection makes sense.

For each point in your presentation outline you should provide some detail and description that supports why you selected each item.

This is an outline for the presentation rather than the actual presentation. Therefore we are looking for the approach you are going to take for the final presentation and how you will support the various aspects of the presentation. For example, what sort of points are you going to make and how will you support them. The outline will require some of the technical details that will describe how you will build the final presentation.

Reference no: EM13863928

Questions Cloud

Analyze wealth transfer between investor and entrepreneur : Analyze the wealth transfer between the investor and the entrepreneur. What can you say about how much they would be willing to spend on monitoring and bonding?
Corporation special situations and organization structure : Corporation Special Situations and Organization Structure
Plan to create a new business : You plan to create a new business, which you want to be designated as minority and women owned (MWBD).Before you can incorporate your company, you must research the following: How you can become certified as MWBD
What are numerical value of the profits for st equal to zero : Draw a graph showing the profits from the two-option portfolio as a function of the underlying asset's price. What are the numerical values of the profits for ST = 0 and ST = X?
Difference between an insider attack and an outsider attack : What is the difference between an insider attack and an outsider attack? What is this defense in depth approach to security that we keep hearing about
Determine over applied overhead for the month : Kirkaid Company recorded the following transactions for the just completed month: $98,000 in raw materials were requisitioned for use in production. Of this amount, $79,000 was for direct materials and the remainder was for indirect materials. Determ..
What types of activities are internal service funds used : what types of activities are internal service funds used to account?
Manufacturing using job costing : Manufacturing using job costing. In may material requisitions were $50834 and raw material purchases were $35634. The end of month balance on raw material inventory was $5277.What was the Beginning raw material inventory balance?
How the dp flow measurement transducer operates : How the DP flow measurement transducer operates and how the DP flow transmitter vertical works?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explain the implications of the risks and techniques

Briefly describe how computers and humans can pose risks to infrastructure assets. Explain the implications of the risks and techniques on critical infrastructure sectors

  Improve security on its network

You were hired as a security consultant for a medium-sized organization. You and your team need to help the organization to improve security on its network

  Problem on network security planning

Securing a large internetwork remains a daunting challenge. Cloud computing and social networks add to this complexity. In two to three (2-3) pages, and using the CISCO SAFE reference architecture.

  Talks about the employee specific security

Following standard talks about the employee specific security, Following standard has good information on setting up IT security policies

  Evaluate from a management perspective the different kinds

assess from a management perspective the different types of security models and their implications to protect the

  Evaluate the strengths and weaknesses of the organizations

Evaluate the strengths and weaknesses of the organizations cybersecurity policy along attributes - Analyze the range of organizational policies (the policy framework) that are needed to effectively manage cybersecurity risks.

  Protection of children against sexual exploitation act

What court struck down most of the Child Pornography Prevention Act, saying that it was unconstitutional to the extent that it proscribed computer images that did not involve the use of real children in their production or dissemination

  Case study on research genetics

ABC Institute of Research has sensitive information that needs to be protected from its rivals. The Institute has collaborated with XYZ Inc. to research genetics. The information must be kept top secret at any cost.

  Content of e-mail rightfully belongs to sender-receiver

Who does content of e-mail rightfully belongs to sender or receiver? Are security threats overblown? Present the example to support response.

  Prepare research paper on defending against virus attacks

Prepare a research paper on Defending against Virus Attacks - You will create a 6 to 8 page research paper. Please include an introduction, body and conclusion. You need to also include at least eight references with in-text citations.

  The proposed cyber security act

Review the May 2011 Cyber Security Legislative Proposal, the proposed Cyber Security Act of 2012, Executive Order (EO) 13636 Improving Critical Infrastructure Cyber security, and Presidential Policy Directive (PPD) 21 Critical Infrastructure Secur..

  Determine the value of the symmetric key

Discuss some of the attacks on the Diffie Hellman key exchange protocol we discussed in the lecture. Present your solution for avoiding such attacks.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd