Security – Assignment-1
I already have common and right answers and these answers with all students
So I need from you to help me, to change the method the and add some sentences
to become ZERO PLIAGRISM
THANKS.
Pg. 04 |
خطأ! استخدم علامة التبويب “الصفحة الرئيسية” لتطبيق Heading 1 على النص الذي ترغب في أن يظهر هنا. |
Deadline: Thursday 11/02/2021 @ 23:59
IT Security and Policies
IT 409
College of Computing and Informatics
Question One
1 Mark
Learning Outcome(s):
LO1: Use effective, proper, and state-of-the-art security tools and technologies.
Explain the main objective for organization to deploy an information security policy, and in your own words, briefly discuss the Corporate culture classifications?
Answer:
The main objective of deploying policy is to protect the critical infrastructure of the organization (assets, systems, and networks), and to control and adjust its operations as well as align them to regulations, which in turn ensures generating products of high quality and lowering costs and keeping clients.
Corporate cultures are often classified by how corporations treat their employees and their customers. The three classifications are negative, neutral, and positive.
A
negative classification
is indicative of a dangerous, or threatening environment. Workers do not feel comfortable and may not be safe; customers are not valued and may even be trapped.
A
neutral classification
means that the business neither supports nor hinders its employees; customers generally get what they pay for.
A
positive classification
is awarded to businesses that provides a welcoming workplace, truly value the customer relationship, partner with their suppliers, and are responsible members of their community.
References: chapter 0ne of the book, pages 2+3+6+7
Question Two
1.5 Marks
Learning Outcome(s):
LO1: Use effective, proper, and state-of-the-art security tools and technologies.
Writing a policy document for an organization can be done in two formats, what are they, explain the pros and cons for each one of them?
Answer:
Singular format: Advantages are:
1. Each policy is typed as a discrete document.
2. Each policy document is short, clean, crisp, and designed (targeting) certain audience.
Disadvantages are:
1. It requires to manage multiple documents.
2. They become fragmented and loss consistency.
Consolidated format: Advantages are:
1. The policies are grouped as a one document.
2. It presents an easy and uniform management.
Disadvantages are:
1. Long size of the document.
2. It is hard to the reader to find the applicable sections.
References: chapter two of the book, page 37.
Question Three
Learning Outcome(s):
LO2: Develop security policies and put in place an effective security architecture that comprises modern hardware and software technologies and protocols.
1 Mark
In your own words, explain the difference between Authorization and Authentication in term of the information security, and provide examples from your daily life with blackboard system.
Answer:
Authorization
is granting users and systems a predetermined level of access to information resources.
Example
: the student can access the blackboard system and only has the ability of reading the discussion questions or reading the marks. The teachers have the ability to update questions and marks as well as reading them.
Authentication
is the positive identification of the person or system seeking access to secured information or systems. Password, Kerberos, token, and biometric are forms of authentication.
For example:
the students, teachers, or technicians can use their own accounts (Id and Pass) to log in the blackboard system.
References:
Chapter three of the book, page 71.
Question Four
1.5 Marks
Learning Outcome(s):
LO3: Recognize networking and security, security issues, trends, and security resources.
How does the Denial-of-Service (DoS) attacks may affect the Confidentiality, Integrity, Availability (CIA) model? List two (2) security measures using which an organization prevent the DoS impact.
Answer:
Basically, A DoS attack is an attempt to make a machine or network resource unavailable for its intended use. In general terms, DoS attacks consume computing resources or obstruct the communication channel. Therefore, if a user tries to contact server or ask to perform a task, the request will not be performed. This means that DoS affects the availability and no relation with the confidentiality and integrity.
Measures
:
access controls, monitoring, data redundancy, resilient systems, virtualization,
server clustering, configuring log files and firewall logs to detect security threats.
References:
Chapter three of the book- pages 70.