Computer Network and Security

User Generated

pvru

Computer Science

Dalhousie University

Description

Unformatted Attachment Preview

Assignment 4 Weight: 20% of your final grade Due: after Unit 6 This assignment covers Unit 6. Like Assignment 3, it has ten questions or problems for you to answer or solve. Organization of Your Assignment You can submit your completed assignment as a Word document. The assignment must have a cover page in Word or HTML containing the assignment number, course number and title, your name and student ID, and the time you spent on the assignment. Be sure to provide links to your answers for each part so that your tutor can easily navigate through them to assess your work. Your assignment cover page must also include the following statement: I declare that this assignment is my own work and that all material previously written or published in any source by any other person has been duly acknowledged in the assignment. I have not submitted this work, or a significant part thereof, previously as part of any academic program. In submitting this assignment I give permission to copy it for assessment purposes only. Upload your completed assignment to the Assignment 4 link on the course homepage for marking and tutor feedback. 1. (10 marks—from problem 14.2) As part of a formal risk assessment of desktop systems in a small accounting firm with limited IT support, you have identified the asset “integrity of customer and financial data files on desktop systems” and the threat “corruption of these files due to import of a worm/virus onto system.” Suggest reasonable values for the items in the risk register for this asset and threat, and provide justifications for your choices. 2. (10 marks—from problem 15.1) Consider the risk to “integrity of customer and financial data files on system” from “corruption of these files due to import of a worm/virus onto system,” as discussed in the previous problem. From the list shown in Table 15.3 of the textbook, select some suitable specific controls that could reduce this risk. Indicate which you believe would be most cost effective. 3. (10 marks—from problem 14.6) As part of a formal risk assessment on the use of laptops by employees of a large government department, you have identified the asset “confidentiality Computer Science 400 Computer and Network Security Page 1 of 3 of personnel information in a copy of a database stored unencrypted on the laptop” and the threat “theft of personal information, and its subsequent use in identity theft caused by the theft of the laptop.” Suggest reasonable values for the items in the risk register for this asset and threat, and provide justifications for your choices. 4. (10 marks—from problem 17.7) Consider the development of an incident response policy for the small accounting firm mentioned in problems 1 and 2. Specifically consider the response to the detection of an e-mail worm infecting some of the company systems and producing large volumes of e-mails spreading the propagation. What default decision do you recommend the firm’s incident response policy dictate regarding disconnecting the firm’s systems from the Internet to limit further spread? Take into account the role of such communications on the firm’s operations. What default decision do you recommend regarding reporting this incident to the appropriate computer emergency response team? —To the relevant law enforcement authorities? 5. (10 marks—from problem 18.3) Argue in detail the advantages and disadvantages of the agent-based and agentless SIEM software approaches described in Section 18.5 of the textbook. 6. (10 marks—from problem 19.4) An early controversial use of the DMCA was in a case brought by the Motion Picture Association of America (MPAA) in 2000. The MPAA attempted to suppress distribution of the DeCSS program and derivatives, which could be used to circumvent the copy protection on commercial DVDs. Search for a brief description of this case and its outcome. Determine whether the MPAA was successful in suppressing details of the DeCSS descrambling algorithm. 7. (10 marks) The ISO/IEC 27000 Series of Standards on IT Security Techniques are very important technical documents for computer and network security. In this exercise, you are required to explore these standards in the series, and then write one page of summary about the 27000 Series of Standards, with a focus on at least five of these standards which you think are more important. 8. (10 marks) Similar to the ISO27000 series, NIST SP800-53 is another important standard for computer and network security. For this exercise, you are required to explore each of the security controls listed in the NIST SP800-53 standard, and then write one page of summary about the NIST SP800-53 standard, including your understanding of the meaning and importance of at least five (5) of these security controls, as well as the roles they play in computer and network security. 9 (10 marks) Recall the CIA triangle for objectives of computer and network security— sometimes a threat to the integrity and availability of computer and network systems may not be from hackers or any computing professionals. Instead, the threats may be from sources such as technical errors, environmental disasters, etc. In this exercise, you are required to explore and explain threats from non-computing sources, as well as prevention and mitigation measures. Computer Science 400 Computer and Network Security Page 2 of 3 10 (10 marks) Security auditing is a very important step in the assurance of computer and network security of an organization, and several standards or recommendations, such as ITU-T Recommendation X.816, have been developed to this end. In this last exercise, you are required to explore these standards or recommendations, and then write in your own words a summary of each standard or recommendation for security audit. End of Assignment 4 Computer Science 400 Computer and Network Security Page 3 of 3
Purchase answer to see full attachment
Explanation & Answer:
10 questions
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: COMPUTER SECURITY

1

Computer Security
Student’s Name
Institutional Affiliation
Course
Date

I declare that this assignment is my own work and that all material previously written or
published in any source by any other person has been duly acknowledged in the assignment. I
have not submitted this work, or a significant part thereof, previously as part of any academic
program. In submitting this assignment I give permission to copy it for assessment purposes
only.

COMPUTER SECURITY

2

Computer Security Principles and Practices
1.Computerized systems are more helpful compared to the manual system in managing
customer financial data for a long period of time. When the system is automatic, it is easy for
one to search for customer account. However, when the account of the customer is saved on
papers or account books, it becomes difficult to search for the information of the customer.
The systems also save time for the customer (William & Lawrie, 2015). It is critical when the
financial data of a customer is integrated into desktop systems in accounting firms.
A computer worm is classified as a malware program that replicates itself so as to spread to
other different computers. Additionally, it uses the network shared by these computers to
spread it across. The security failures of the set out computers determine the spread of the
malware to its programs (Conklin, White, Cothren, Davis, & Williams, 2015). The computer
worm does not need necessarily to attach itself to a program. Worms have the ability of
causing harm to the computer network by consumption of their bandwidth while viruses have
the capacity of modifying itself within the files of the targeted computer.
Furthermore, worms that have been created are designed with the aim of spreading and have
no capacity of changing the system in which they move through the system. Payload free
worms have the capacity of disrupting the increasing level of network congestion and other
different unintended impacts. A payload worm is seen as a language that has been
implemented in the worm to help in spreading the worm to other files and has the capacity of
deleting different files found in the host system.
The most common payload worm involve the installation of a backdoor that has been infected
by the computer so as to give way for the formation of a zombie which is usually under
rheostat from the author of the worm. The network preferred by such apparatuses are always
referred to as botnet and are usually used by the contributors of spam to help in spreading
junk emails and then cloak their website addresses. Spammers are seen as the main sources of

COMPUTER SECURITY

3

sponsoring the creation of such types of worms. On the other side, some have been
threatening companies with attacks of DOS.
Use of anti-spyware and anti-virus are seen to be helpful and should always be updated. They
should be updated with new files at least after some few days to ensure that they are able to
give the required security (AlHogail, 2015). There is also recommendation of firewall that
plays a critical role in reducing the spread of attackers in the computer system.

2. Security risk assessment is one of the key aspects that organizations use in their security
policies. The emergence of possible vulnerabilities and threats arising in organizations are
supposed to be addresses before apply...


Anonymous
Really helped me to better understand my coursework. Super recommended.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags