The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Jul 2017 |
| Last Sign in: | 304 Weeks Ago, 1 Day Ago |
| Questions Answered: | 15833 |
| Tutorials Posted: | 15827 |
MBA,PHD, Juris Doctor
Strayer,Devery,Harvard University
Mar-1995 - Mar-2002
Manager Planning
WalMart
Mar-2001 - Feb-2009
Hello again,
Thank you so much for the prev
Based on the required reading materials and your own research, prepare a 4- to 7-dbl spaced page paper to discuss various threats to information security. You are to address the following questions in the paper:
Your paper should provide a summary of your findings from the assigned materials and any quality resources you can find. Cite all sources and provide a reference list at the end of your paper. The following items will be assessed in particular:
Use at least 1 reference from each of the 3 sections. Total at least 3
There are many sources of threats to information security. They can come from:
Human Factor
Cliff Edwards, Olga Kharif, and Michael Riley (2011). Human Errors Fuel Hacking as Test Shows Nothing Stops Idiocy
Homeland Security Test Shows Human Errors Fuel Hacking: https://www.youtube.com/watch?v=rvVzHK29MK4
Failure to update software behind federal data breach: https://www.youtube.com/watch?v=0X7QylrAnnA
Nonverbal human hacking: https://www.youtube.com/watch?v=SZ8kJNojrzI
Pesante, L. (2008). Introduction to information security. Retrieved from https://www.us-cert.gov/sites/default/files/publications/infosecuritybasics.pdf
Paul Rubens (2011). Stop Software Attacks From Destroying Your Servers
Infosec Institute (Physical security: Managing the intruder)
United States Government Accountability Office (2009). “Information Security: Cyber threats and vulnerabilities place federal systems at risk.”
Brian Krebs (2011). Cyber Intrusion Blamed for Hardware Failure at Water Utility
Perrow, Charles (2008). Software failure, security and Cyber attack.
Natural and Man-made disasters
Defending Your Business Against Natural Disasters: A Look at Data Protection Solutions from http://www.stratech.com/solutions/data-protection-solutions/data-protection-and-natural-disasters.php
Optional Reading
U.S. Air Force hands out cyber security contracts worth up to $300 million (July 11, 2012) from http://www.infosecurity-magazine.com
Security strategies, retrieved from http://technet.microsoft.com/en-us/library/cc723506.aspx
Section B: Attacks
There are various forms of attacks that aim to compromise a system: social engineering, viruses, worms, Trojan horses, back doors, denial of service attacks, spoofing, spams, sniffers, phishing, etc. Next, we will study how they work.
Back doors—Ways of accessing a computer without the security and authentication procedures that are normally required.
Section C: Ethical Hacking
An ethical hacker—penetration tester—must be familiar with laws involving computer technology. The laws related to IT change quickly, and tests that are legal in one state might not be in another one. For example, in Hawaii, the state needs to prove that the person who is charged with crime on a computer had the intention to create damage, and the computer he uses is used by himself/herself only. Before starting security testing, it is important to have a clear written contract that specifies the scope of the tasks; going beyond the scope of tests can be troublesome and might incur a lawsuit from the employer. Read the following materials for more information:
Note: As a security tester, it is important to make sure your program will not use so many computer resources that employees will not able to get access to the network. The situation would create a denial of service problem, and you might end up violating state law.
Check the following sites for malware attacks:
Note: New viruses are created daily; antivirus software can only deal with the known ones. Hence, keeping antivirus software up to date is very important. To learn more about viruses and worms, and how to prevent infection, check the above two links.
To beat hackers, it helps to understand what they do and how they think. There are many online resources that teach you how to create viruses. Accessing them is dangerous, though, since many of these sites have Trojan horses and viruses that might infect your machine.
To get certificated as an ethical tester, here are a few popular options:
us help. I've got more coming your way if that is ok. See attached for question.
Attachments:
----------- ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly