GC Information Systems Security Access Control List Discussion

User Generated

funan11

Business Finance

Grossmont College

Description

1. Following the instructions showing on the file "HWK - 10 Problem 1 Instruction.dox to create the database for IP access control list and the queries and reports. paste the requested query and reports below.

2. read: So what? New From Black Hat 2017 on page 391 and answer the discussion questions 1-5

3. Read the security guide: Largest data branch ever! on page 408 and answer the discussion questions 1-4

Unformatted Attachment Preview

Management Information Systems Reporting the Access Control List. Suppose that you have been asked to develop a database to facilitate the creation of access control lists for your organization’s firewall. Assume that managers submit all blocking requests and that each request is reviewed by a data communications specialist. Your database is to keep track of managers, their requests for blocking IP addresses, and each specialist review of the request. Question: How many tables should we create? A) For the managers, create a table with the following fields: (note that it is not recommended to leave space between words for Access. Sometimes it might be fine, like we did in the last lab. But it may cause trouble when you add more complicated functionalities.) • FirstName • LastName • Department • EmailAddress Question: Which field should be the primary key of this table? Put some records in the table (see info from table 1 attached) B) For the specialists, create a table with the following fields: • FirstName • LastName • EmailAddress • Specialty (long text type) Question: Which field should be the primary key of this table? Put some records in the table (see info from table 2 attached) C) For each request, create a table with the following fields: • RequestID (autonumber) • DateOfRequest • IPAddresses (to block) (Text or short text) • BlockType: incoming/outgoing/both? • SubmittedBy (email of manager) • ReviewedBy (email of specialist) • Status: (Default value: unreviewed, other values: block, refuse, pending) Question: Which field should be the primary key of this table? Assume that your database is to track the name and email of the manager who made each request. Assume that a manager can make many requests, but that a particular blocking Management Information Systems request is made by one manager. Finally assume that all requests are reviewed by data communications specialists. After a review, the specialist grants the block, refuses the block or places the block into a pending status (waiting for more information). Your database is to track the name and email of the specialist who made the review. A specialist can review many requests, but each request is reviewed by at most one specialist. Question: What should be the relationship among the three tables? D) Create a data entry form to enter request: Only show the fields needed to be filled by the manager. Change the type of entry for BlockType and SubmittedBy. a. Then add the following entries 1/1/2020 144.23.65.87 incoming gwashington@company.com 1/4/2020 144.25.68.89 both gwashington@company.com 2/13/2020 144.34.34.43 Outgoing bclinton@company.com 2/14/2020 144.23.67.33 Incoming dtrump@company.com 1/1/2020 144.23.33.37 Incoming bclinton@company.com E) Create a secondary data entry form to enter review by specialists. (Lock the fields which should not be entered. Change the entry type for Status.) a. Then add the following entry: • Fang Fang reviewed the first two requests, and decide to grant block to the first request but pending the second one. • Yi Sun reviewed the 4th request, and decide to pending that request • The 3 and 5th request stays unreviewed F) Generate the following query tables: • All data for all requests sorted by request date, showing the date of request, names of the mangers who submitted requests, the IP addresses, and type of blocking, status of request, and the names of the specialists who reviewed the request. • All pending requests, showing the date of request, names of the mangers who submitted the requests, the IP addresses, and type of blocking, and the names of the specialists who reviewed the requests. (Note: the field “status” should be included in the table and criteria set as “pending”, uncheck the “show” box so that this field does not show in the query table.) • All requests reviewed by Fang Fang, showing the date of request, names of the mangers who submitted the requests, the IP addresses, and type of blocking, and the status of request) G) Generate three reports, one for each query created in step F. H) Paste the screen shots of the two forms and three reports to the submission doc. Management Information Systems Table 1: ManagerInfo. Manager FirstName LastName Department EmailAddresses George Washington ProductDemo gwashington@company.com John Adams Sales jadams@company.com Barack Obama Design bobama@company.com Abraham Linkon Outsourcing alinkon@company.com Bill Clinton SupplyChain bclinton@company.com George Bush R&D rgiuliani@company.com Donald Trump CustomerService dtrump@company.com Ronald Reagan Facility rregan@company.com Table 2: SpecialistInfo Specialists FirstName LastName Email Specialty Fang Fang fangfang@company.com MIS Bennett Cherry bcherry@company.com Management Yi Sun ysun@company.com Multimedia Kevin Hee khee@company.com Accounting Wayne Neu wneu@company.com Marketing Robert Aboolian raboolian@company.com Operations Industroyer: The most talked about presentation at Black Hat was a piece of malware designed to knock out entire power grids. It was used in December 2016 to knock out the power in the Ukraine for an hour. Robert Lipovsky (ESET) and Sergio Caltagirone (Dragos) led two different security research teams that outlined how Industroyer (also called CrashOverride by the Dragos researchers) was able to shut down power grids by taking advantage of the communication protocols used by the industrial control systems. Attackers using the malware can force power substations to isolate themselves by continually turning circuit breakers on and off until they automatically sever their connection with the rest of the power grid. This makes the malware effective against a wide variety of power grid systems produced by a variety of manufacturers. This type of malware would likely be most valuable in a cyberwar. Knocking out power and communication systems is a top priority in a cyberwar. It effectively blinds the opposing country and makes counterattacks difficult. Industroyer could give organized nation-state actors the tools to launch an initial salvo in a cyberwar and knock out power for a couple of days. In developed countries like the United States, uninterrupted power is vital for daily operations at hospitals, online retailers, telecom providers, and many others. Prolonged power losses would be catastrophic. DO DE D Aa » NOX Cougar Courses myCSUSM f Facebook Target Corporate YouTube palomar chase P palomar . So What? New From Black Hat 2017 Hackers, security professionals, and government agents flock to Las Vegas each year to attend an important security conference Black Hat. Black Hat caters to hackers, security professionals, corporations, and government entities. Each year speakers make briefings on how things can be hacked. Presenters show exactly how to exploit weaknesses in hardware software, protocols, or systems. One session may show you how to hack your smartphone, while another may show you how to empty the cash out of an ATM. Presentations encourage companies to fix product vulnerabilities and serve as an educational forum for hackers, developers, manufacturers, and government agencies. The following are highlights from the 2017 Black Hat conference: Focusing on Defense: The keynote presentation at Black Hat was given by Alex Stamos, Facebook's chief security officer (CSO) 7 Stamos made an empathetic and consolatory talk about trying to solve the real issues facing users. He asked attendees to focus more on stopping real threats that actually harm users, such as spam, DoS attacks, and malware. Too often, the security community focuses on presentations about obscure vulnerabilities that rarely happen but are dazzling to other security professionals Stamos urged attendees to realize that organized groups are attacking things that matter to everyone, not just security professionals. This includes things like critical infrastructure, voting machines, and personal data (as evidenced by massive data breaches). Securing the systems that house this information helps everyone. Stamos pointed out that defending against these common types of attacks is far more important and beneficial than doing a demo of a rare attack to a small group of friends in a hotel Industroyer. The most talked about presentation at Black Hat was a piece of malware designed to knock out entire power grids. It was used in December 2016 to knock out the power in the Ukraine for an hour. Robert Lipovsky (ESET) and Sergio Caltagirone (Dragos) led two different security research teams that outlined how Industroyer (also called CrashOverride by the Dragos researchers) was able to shut down power grids by taking advantage of the communication protocols used by the industrial control systems. Attackers using the malware can force power substations to isolate themselves by continually turning circuit breakers on and off until they automatically sever their connection with the rest of the power grid. This makes the are attentive nominat we unriatunturin utame nearthu sunt nf manufacturare Aa 519 V Source: Koneple Photography/Alamy Stock Photo • Broadpwn: Another widely discussed presentation by Nitay Artenstein showed how a WiFi worm could automatically spread from network to network and infect all WiFi devices with Broadcom wireless cards. Artenstein identified a buffer overflow vulnerability that allowed him to remotely install malware that then spread to WiFi clients and access points. Any device with a Broadcom wireless card would be affected. This includes all Android and Apple devices. Fortunately, both Google and Apple released patches for the vulnerability just before Artenstein's presentation at Black Hat. Questions 1. Why would Alex Stamos want security researchers to focus on fixing vulnerabilities rather than finding them? 2. Why would nation-states be interested in developing malware like Industroyer? 3. What type of consequences might follow if Industroyer was able to knock out power for more than a week? 4. Besides power grids, what other types of infrastructure might nation-states target in a cyberwar? Why would they target these types of infrastructure? 5. Suppose Broadpwn malware was released into the wild and was able to immediately propagate between all access points and wireless clients (i.e., smartphones, laptops, and tablets). How long do you think it would take for most systems to be infected? What might affect the rate of infections? To make trade-off decisions, organizations need to create an inventory of the data and hardware they want to protect and then evaluate safeguards relative to the probability of each potential threat. Figure 10-3 is a good source for understanding categories and frequencies of threat. Given this set of inventory and threats, the organization needs to decide how much risk it wishes to take or, stated Aa 51 stv chase P palomar canvas Pandora N Netflix Cougar Courses myCSUSM f Facebook Target Corporate Youtube palomar The blogs, wikis, and social media platforms that are the juggernauts of the Internet today did not exist, and the search engines in use at that time were precursors to Google. One of the core sites that attracted heavy usage at that time was Yahoo! Developed in 1994 by David Filo and Jerry Yang, Yahoo! was essentially a portal for accessing a variety of different types of content on the Web. 15 This included topics like arts, business, entertainment, news, recreation and sports, and science. Within 2 years, the company was worth more than $800 million, and at the peak of the dot-com bubble in 2000, Yahoo! was valued at more than $125 billion. 16 Over the next 15 years, the company attempted a number of acquisitions (including a failed acquisition attempt of Google in 2002). In 2008, Microsoft tried to acquire Yahoo! but was denied. Yahoo! was finally purchased by Verizon in 2016 for more than $4 billion. 17 Despite its permanent place as a pioneer on the early Web and its persisting prominence over the past 20 years, Yahool's reputation has been permanently tainted by a recent breach in which more than 3 billion user accounts were compromised. That's nearly half the population of all people on the planet! What Happened? In December 2016, Yahoo! announced that a breach had occurred in August 2013 that resulted in roughly 1 billion user accounts being compromised. The company later announced in October 2017 that it believed 3 billion accounts had actually been compromised. In either case, Yahool's breach is the largest of its kind in the history of the Internet. Even worse, it took over 3 years for Yahool to disclose the data breach 18 It was reported that the stolen account information included email addresses, names, phone numbers, hashed passwords, and, for some users, security questions and answers, 19 Initial speculation about the breach concluded that the attack was likely attributable to state-sponsored actors, as very little account info from the breach was posted on the dark Web. This means the attackers were looking to compromise the accounts of specific individuals, likely associated with the government or military, and were not planning to just sell all of the stolen account data online. These suspicions were later confirmed when a 22-year-old hacker was apprehended in Toronto and ultimately pleaded guilty in a San Francisco court to working with another hacker and aiding two Russian spies in stealing Yahoo!'s user account data. He was H. 20 TL than lid is the heart and in the 6 Aa 5) bookshelf.vitalsource.com took 01 Pandora N Netflix Cougar Courses myCSUSM Facebook Target Corporate YouTube palomar chase Ppalomar canvas you would likely respond in this situation.) 3. The article reports that several years transpired between the time when the breach occurred and the time when the breach was acknowledged and made public. Why is there so much latency between the incident and the response? 4. Compare this breach to the Equifax data breach that also happened recently. (If you are not familiar with the Equifax breach, take a few minutes to conduct an online search and read about it.) Was the Equifax breach or the Yahoo! breach worse? Be prepared to defend your opinion. So, what will happen? Cloud vendors and major organizations will continue to invest in safeguards; they'll hire more people (maybe you) train them well, and become ever more difficult to infiltrate. Although some criminals will continue to attack these fortresses, most will turn their attention to less protected, more vulnerable, midsized and smaller organizations and to individuals. You can steal $50M from one company or $50 from a million people with the same cash result. And, in the next 10 years, because of improved security at large organizations, the difficulty and cost of stealing that $50M will be much higher than stealing $50 a million times. Part of the problem is porous national borders. People can freely enter the United States electronically without a passport. They can commit crimes with little fear of repercussions. There are no real electronic IDs. Cyber-gangs are well organized, financially motivated, and possibly state-sponsored. Electronic lawlessness is the order of the day. If someone in Romania steals from Google, Apple, Microsoft, or Boeing and then disappears into a cloud of networks in Uzbekistan, do those large organizations have the resources, expertise, and legal authority to pursue the attackers? What if that same criminal steals from you in Nashville? Can your local or state law enforcement authorities help? And, if your portion of the crime is for $50, how many calls to Uzbekistan do they want to make? At the federal level, finances and politics take precedence over electronic security. The situation will likely be solved as it was in the past. Strong local electronic" sheriffs will take control of their electronic borders and enforce existing laws. It will take at least a couple decades for this to happen. Technology is moving faster than either the public or elected officials can educate themselves. Take another look at Figure 10-60. Send a copy to your loved ones. U Aa 51 TI STV Security Guide Largest! Data! Breach! Ever! Spam Delete on for Yahoo Users yahoo.com YAHOO! UPDATED NOTICE OF DATA BRE Dear ser. We are previous issue Yahoo date you about a co already took o help secure your nnection with issue that, based on its Sur Army Stock Phot If you think back to your earliest experiences with the World Wide Web, you may recall the atmosphere of a Web 1.0 world. Web 1.0 was an extremely stripped-down version of the Web that we know and love today. At the time, a majority of Web content was static text. Fancy animations, embedded videos, and rich graphics were not even possible due to a variety of constraints (e.g., limited bandwidth). Additionally, the vast majority of people accessing the Web at that time were content consumers, not content creators. The blogs, wikis, and social media platforms that are the juggernauts of the Internet today did not exist, and the search engines in 1- Aa » specific individuals, likely associated with the government or military, and were not planning to just sell all of the stolen account data online. These suspicions were later confirmed when a 22-year-old hacker was apprehended in Toronto and ultimately pleaded guilty in a San Francisco court to working with another hacker and aiding two Russian spies in stealing Yahool's user account data. He was charged with hacking and aggravated identity theft.20 The other three involved in the breach were located in Russia and were thus outside any legal ramifications from the U.S. court system. Do You Still Yahoo!? It can be very difficult for a company and its brand to recover from a security incident, especially one of this magnitude. An understandable outcome of any data breach is that consumers may choose to no longer engage with the compromised company. However, at the time that this breach was made public, Yahoo! was also in the process of being acquired by Verizon. The breach had an impact on the valuation of the company, which had initially been $4.85 billion, but the company was ultimately acquired for $4.5 billion (a loss of $350 million). While the acquisition may have brought closure to the Yahoo! breach, causing it to fade from our minds, it is only a matter of time before the next big cyber-incident reverberates through the tech world and we relive this process all over again. Discussion Questions 1. Most data breaches are found within a few days or weeks. Why did the Yahool data breach take so long to be discovered? Would the disclosure of the data breach have been harmful to Yahoo!'s efforts to sell their company? 2. Have you been a victim of one of the large security breaches over the past several years? If so, what was the impact of your data being compromised? Did you have to take any actions to try to secure your data or your identity? Have you continued being a customer for using the site) of the company that was compromised? (If you have not been a victim, think about how you would likely respond in this situation.) 3. The article reports that several years transpired between the time when the breach occurred and the time when the breach was acknowledged and made public. Why is there so much latency between the incident and the response? Aa dtv SR w
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

View attached explanation and answer. Let me know if you have any questions.

Reporting the Access Control List.
Suppose that you have been asked to develop a database to
facilitate the creation of access control lists for your organization’s
firewall. Assume that managers submit all blocking requests and
that each request is reviewed by a data communications specialist.
Your database is to keep track of managers, their requests for
blocking IP addresses, and each specialist review of the request.
Question: How many tables should we create?
A) For the managers, create a table with the following fields: (note that it is not
recommended to leave space between words for Access. Sometimes it might be
fine, like we did in the last lab. But it may cause trouble when you add more
complicated functionalities.)
• FirstName
• LastName
• Department
• EmailAddress
Question: Which field should be the primary key of this table?
A primary key is a column or set of columns in table whose values uniquely identify a row
in the row. In this case uniquely identification numbers will be the email addresses which
will be used to identify

B) For the specialists, create a table with the following fields:
• FirstName
• LastName
• EmailAddress
• Specialty (long text type)
Question: Which field should be the primary key of this table?
Specialists
FirstName
Fang
Bennett
Yi
Kevin
Wayne
Robert

LastName
Fang
Cherry
Sun
Hee
Neu
Aboolian

Email
fangfang@company.com
bcherry@company.com
ysun@company.com
khee@company.com
wneu@company.com
raboolian@company.com

Specialty
MIS
Management
Multimedia
Accounting
Marketing
Operations

C) For each request, create a table with the following fields:
• RequestID (autonumber)
• DateOfRequest
• IPAd...


Anonymous
I was stuck on this subject and a friend recommended Studypool. I'm so glad I checked it out!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags