Identify the current software security threats

Assignment Help Computer Network Security
Reference no: EM13938515

Description: The Emirates started in 1985, and today it has become the largest airline in the Middle East. It's Dubai based head office manages approximately 50,000 employees and has a turnover of US$ 18.4 billion turnover per year. The IT Security & Information Assurance department (ISIA) of this large organisation has several key responsibilities, including designing, planning and creating of secured infrastructure. The ISIA is led by a Chief Information Security Officer (CISO) and eight security managers responsible for the key areas, such as Information & Physical security, Privacy, Business continuity, Managing Malware and Botnets, Identifying security holes and Applying appropriate remediation measures. With growing technological advances and recent threats to Information Security, senior management is concerned about organisational preparedness to handle the threat. The CISO strongly believes that the assessment of security risks and proactive steps to manage these risks are the key steps for both hardware and software security. The CISO often thinks that The Open Web Application Security Project (OWASP) is a good source to identify the current software security threats.

Task: As a first step, CISO asks you, one of the Security Managers, to review the top ten risks listed under OWASP so that Emirates is informed about the current software risks and the steps they need to take to handle them. Your responsibility is to identify and analyse at least FIVE major risks listed under the OWSAP and propose ways to overcome those threats. Your evaluation of risks and suggestions must be presented in a report format to CISO.

Reference no: EM13938515

Questions Cloud

What depreciation method does abercrombie and fitch use : What depreciation method does Abercrombie & Fitch use? What depreciation method does Aeropostale use? What are the typical useful lives of each company's operating assets?
Calculate the present value break-even point : Calculate the present value break-even point (also called the financial break-even point). Initial Investment: $700. Fixed Cost: $200 per year
Duration of the project at an interest rate : In OLQ2 and GSPT1 you did numerous duration calculations for a variety of bonds. Examining your results, explain how your results illustrate the following claims (from slides 41-42 of your week 06 lecture).
Best choice for a market index in the regression : Legion, Inc. is a small high tech firm whose stock trades on the NASDAQ. You want to estimate the stock's beta using a regression based on the empirical market line. That requires regressing the stock's returns against the contemporaneous returns on ..
Identify the current software security threats : The CISO often thinks that The Open Web Application Security Project (OWASP) is a good source to identify the current software security threats.
What results from other tests would contribute to diagnosis : Although a bone density scan is the test that verifies a diagnosis of osteoporosis, what results from the other tests (chemistry profile, thyroid studies, urinalysis, and CBC) would contribute to the diagnosis?
Set of measurements for the lifetime : You have been supplied with a set of measurements for the lifetime of a bearing in the file ass3q1data.csv. You should use this data to construct a model for the behaviour of the real lifetime (the lifetime of the population). It has been well-est..
Firm is financing its growth with retained earnings : A firm is financing its growth with retained earnings. It is retaining 80 percent of its annual earnings. The firm's historic return on equity is 16 percent, a figure that is expected to continue into the future. How much will earnings grow over the ..
Write a main function that declares an array of 10 grocery : Write a main() function that declares an array of 10 GroceryItem objects. Assign values to all 10 items and display them.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Difference between symmetric and asymmetric encryption

Write a very brief scenario of what "could" happen if a brand new Linux user accidentally logged in as root instead of as another type of user. Try to make your scenario as realistic as possible, but limit it to two sentences.List one difference b..

  Question about system maintenance

The 4-types of IT system maintenance also apply to other industries. Assume you were in charge of aircraft maintenance for a small airline.

  Information security

Write the word "statistic" without the repeated letters. Then complete the cipher with the unused alphabet characters.

  Discusses the current state of relating technologies

Discusses the current state of relating technologies and various aspects necessary for a better home network implementation from an ecological point of view.

  What are the pros and cons of each method

What are the pros and cons of each method? If you are the security officer of your company and want to set up a key distribution mechanism, which one would you choose to use?

  The difference root cause analysis and simply identifying

It is important to identify what issues will be targeted before revision can begin in the upcoming Innovate phase. In the Understand phase, you conduct root cause analysis, which not only helps to determine the right problems to attack, but also t..

  Structure for the task of implementing

Draft a work breakdown structure for the task of implementing and using a PC-based virus detection (one that is not centrally managed)

  Describe how bob can recover the message

Describe how Bob can recover the message - Through how many ciphertext blocks is this error propagated? What is the effect at the receiver?

  Important benefit of asymmetrical encryption

What is the most important benefit of asymmetrical encryption? Contrast with symmetrical encryption - Which part of CAIN is realized through the use of message digest functions and hashes?

  Determine the encrypted message-s entropy

If this message is sent unencrypted and successfully received, determine its entropy? If this message is encrypted with DES using random 56-bit key, determine the encrypted message's entropy?

  The network administrator to protect the network against

over the past several years the chief executive officer of your company has read articles on internet control message

  What is the value of the symmetric key

In the Diffie-Helman protocol, what happens is x and y have the same value, that is, Alice and Bob accidentally chosen the same number? Are R1 and R2 same?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd