Explain areas of information technology as a metric

Assignment Help Basic Computer Science
Reference no: EM13761789

Part 1

"Security Objectives" Please respond to the following:

· The confidentiality, integrity, availability (CIA) triad represents generic security goals. CIA is typically applied to specific areas of information technology as a metric or guideline for establishing or maintaining security. Apply CIA principles to email technology. Explain in detail how each of the three components of CIA can be satisfied in a typical email transaction from one user to another. Be sure to include specific technologies involved (such as digital certs, signed certs, encryption, etc.).

· Security today, in one way or another, depends on trust relationships. Describe two scenarios in which the trust relationship between a user (client) and e-Commerce site (server) may be violated after being granted digital certificates from the same certificate authority (CA). Also, determine some possible mitigation steps.

Part 2

"Necessary Filtering " Please respond to the following:

· Analyze in detail a non-stateful firewall's interaction with the transmission control protocol / Internet protocol (TCP / IP) stack as a packet arrives from an internal (trusted) interface and is destined for a network on its external interface. Describe the details of the decision-making process.

· As you may already be aware of by now, port 80 traffic possesses one of the largest security threats in the IT industry today. This is evident since in today's world the Internet is so powerful and is used for so many different purposes within any organization that it cannot be completely taken out of the picture. Explain in detail how a Web proxy might be used to detect malware from entering or leaving organizations.

Reference no: EM13761789

Questions Cloud

Diesel engine designer watches can be extremely sturdy : Diesel engine is surely an Italian firm as their principal earnings emanates from offering apparel. These are renowned pertaining to Skinny jeans and also other equipment which have been geared towards diesel watches impacting your junior. The cor..
Encryption requirements as stated in the law : Identify ONE law, either a US Federal Law or a US state law, that requires the use of encryption to protect either consumer or corporate information from unauthorized disclosure. Write a 150+ word plain English summary in which you address the fol..
Program reads the contents of employees : Design a program that reads the contents of the employees.dat file and prints all the data within it. Format the report as designated in the Printer Spacing Chart below.
Ethical issues in information systems : Ethical Issues in Information Systems- Choose one (1) ethics issue, You may also use the Internet or the Strayer Library to research articles on ethical issues in information systems and choose one (1) ethics issue of interest to you
Explain areas of information technology as a metric : The confidentiality, integrity, availability (CIA) triad represents generic security goals. CIA is typically applied to specific areas of information technology as a metric or guideline for establishing or maintaining security.
Network implementation plan : Network Implementation Plan-After a network has been installed and becomes operational, the system must be maintained. An important part of an implementation plan is preparation for the operation of the network and the potential problems that migh..
Display the commands : Display the commands(s) used to do the following (and show the results): see the df command to view file system use in megabytes.
Research organizational benefits of using databases and dbms : Research organizational benefits of using databases and DBMS's. Supplement your research with a review of your lessons. Post a response to the discussion board: Respond to the following statements and, if appropriate, include personal experience as..
Crime and ethics based problems : Some violations, although technically a crime, may be referred to as an administrative violation, which involves fines.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Risk assessment tools

Risk assessment tools.

  Review the car-caravan analogy

Review the car-caravan analogy

  Writing a program to maintain the student database

Writing a program to maintain the student database

  Which of these conditions returns true

Which of these conditions returns true? Check the Java documentation for the inheritance patterns.

  Develop a class average program

Develop a class average program similar to (1-a) that process grades for an arbitrary number of students each time it is run

  How and why would ejecta affect short term climate

Many things can happen when a large NEO strikes earth. Consider only ejecta for a moment. How and why would ejecta affect short term climate?

  Prepare a gantt chart or project plan

Create a Gantt chart or project plan to record tasks,subtasks, resources and identify the schedule of the project - update the Gantt chart or project plan. -

  Explaining gui differences and security differences

With that being said, its great that each of you pointed out the GUI differences. What about the Security differences?

  Input and output of entire objects to or from a file

Which of the following classes enable input and output of entire objects to or from a file?   SerializedInputStream and SerializedOutputStream

  Would an arraylist be better suited for your use

Would an ArrayList be better suited for your use

  The predicate should take two arguments

The predicate should take two arguments: a list corresponding to the program to execute, and a list corresponding to the contents of the resulting stack.

  Explaining power over ethernet and transfer power over fiber

A recent article in industry magazine discussed the ability to transfer Power over Ethernet (PoE) and emerging technology that is able to transfer Power over Fiber (PoF).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd