Description
Physical vs. Logical System Models" Please respond to the following:
- Your intern is confused about the difference between physical and logical system models. Explain the difference between the two models to her.
- After explaining the difference between the models, she asks if you can provide her with examples as to when each model would be appropriate. Give at least one example for each of the two models
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
This is great! Exactly what I wanted.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
ISSC 642 Central Texas College Killing with Keyboards Discussion and Responses
This is a two part questions. First I will need the discussion question answer which will be below in bold, 300 words APA ...
ISSC 642 Central Texas College Killing with Keyboards Discussion and Responses
This is a two part questions. First I will need the discussion question answer which will be below in bold, 300 words APA format. For those response I will need two responses of at least 175 words each.
Please look at the killing with keyboards file then answer the following questions in the context of the best practice concepts covered in chapter 11 and the security professional proficiencies covered in chapter 13. Identify what is at risk here, 5 possible threats and 5 vulnerabilities in this scenario. Analyze measures that could be taken to reduce the risks.
Part two
Student one:
I hope all is well and you are excited to be moving into week 5 of this course. This week, we are able to use our readings and apply it to a training I have seen a few times now. This is a great example of how a bunch of information can be pulled together to get a better picture.
After reviewing “Killing with Keyboards” we are asked to answer these questions:
What is at risk here?
Identify 5 possible threats, and 5 vulnerabilities in this scenario
Discuss measures that could be taken to reduce the risks.
The risk in this situation is not only one but could be many. The first and one that stands out to me the most is lives of the family. Along with family, there are also risk of others. Moving down on my own priority list is risk of leaking sensitive information hurting the organization but also the individual with possible loss of position and clearance. This scenario is an example of aggregation. They put a bunch of what looks like basic information together making it deemed to be a higher classification such as name, family, organization, address, phone numbers, and so on.
Vulnerabilities
The Internet is an open-source tool that anyone can use for potential harmful tasks.
Not being aware of your surroundings at all times.
Social media and Blog Sites can use fake or anonymous accounts. Example of possible social engineering
Disclosure of too much information. Aggregation of unclassified information to produce a classification of secret material.
Utilizing same username and password in many places. This is due to brute force attacks and a single point of failure.
Threats
Users on Social Media and Blog Sites. Due to being able to be anonymous, all users pose a threat to the information you share.
Foreign Government. In this situation, a foreign government is a threat exploiting persistent attack.
The individual is a threat as well. By disclosing information and talking about sensitive topics, he is a threat to the organization.
Public Wi-Fi is a threat because you never know the type of security that it has implemented. Also once you have a password or access, a hacker can begin monitoring all traffic on that network.
Individual met at the unclassified conference is a threat. This individual is a threat to himself, family, information, and the organization.
Preventative Measures
Completed information security training whether that be annual, semi-annual, or quarterly.
Review all information posted on social media. This needs to be done by all individuals no matter the type of work conducted or the organization you work for. Keeping yourself safe is more important than sharing on social media.
Review all information posted about position, project, and more. Best practice is to just not post anything about work. This is mainly focused at blog sites due to the threat they can have.
Do not discuss work with strangers and report to security if they are asking to detail of questions
Understand that because of a clearance everything you do and say become information that someone wants.
Before going on a trip, get security briefings on what to do in different situations you may be faced with
I look forward to reading all your comments and hope you have a great rest of your week.
Reference
Bejtlich, R. (2004). The Tao of Network Security Monitoring: Beyond intrusion detection. Boston, MA: Addison-Wesley.
Segal, C. (n.d.). 8 Cyber Security Best Practices For Your Small To Medium-Size Business. Retrieved March 31, 2020, from https://www.coxblue.com/8-cyber-security-best-prac...
Top 10 Secure Computing Tips. (n.d.). Retrieved March 31, 2020, from https://security.berkeley.edu/resources/best-pract...
Student two:
This presentation was awesome. I have tried many times in explaining to my family, being in the military myself with knowledge, numerous times about posting crumbs on the internet. I will be showing this presentation with the hope that this helps it sink in a it. I will also be showing it to my soldiers. What is at risk here? There are s couple of things that are at risk. The upmost important factor that was at risk was the family. That picture was terrifying. Secondly, the lives of our servicemen and women. Third, the information that was supposed to be confidential. What were some possible threats? One, a foreign government training child to search the internet for vital information. Two, social media. The individual himself was a threat. Three, He was complacent. Four, He talked about classified information with an unknown person. Five, the man at the conference was the final threat. He even had pictures of his family to show Chris if he didn’t get the information organically. What are some vulnerabilities in this scenario? One, let’s start with the individual himself. He was complacent, which makes hm vulnerability to threats. Two, he was lonely at the conference and just wanted someone to talk to and saw a fellow with like interest. Three, social media is always a vulnerability. Four, free Wi-Fi. Five, just the internet itself can make you vulnerability. As in the presentation, everything is one there posted from other sources and then can be compiled to make a profile, big data. Some of these risks can be reduce by be aware of what you are posting on social media and what others are posting about you or with you in social media. Taking the security briefings more seriously and quit thinking they are a joke or outdated. Talk to your security personal about what precautions to take when out of town, like at a conference. It is ok to talk to new people but not ok to talk about classified information even if they brought it up first.
GCU Python Steganography Multi Variate Encoding Paper
The purpose of this assignment is to demonstrate steganographic encryption using Python.Locate and obtain the collaged pho ...
GCU Python Steganography Multi Variate Encoding Paper
The purpose of this assignment is to demonstrate steganographic encryption using Python.Locate and obtain the collaged photo from Topic 6.Encrypt the simple text message "Gotcha!" into the photo.Use the completed collage photo from Topic 6.Generate a secret text message. Picture of the message must be the same size as the collaged picture.Use Python to create and implement a steganography algorithm that will embed the message within the collage photo. [encode]In a separate program, prompt the user to decode the steganography algorithm and provide the decode functionality to match. [decode]Submit the following in compressed, zip file format:Your 2 Python programs. Naming convention is: firstInitial+lastName+StegoEncode.py and firstInitial+LastName+StegoDecode. Example: dHaralsonStegoEncode.py and dHaralsonStegoDecode.pyAt least one screen capture per program demonstrating that each of your programs were functional.Original message file, original picture, encoded picture and decoded picture.ZIP file naming convention is: firstInitial+lastName+stego.zip
University of Cumberland Wk7 Business Intelligence Knowledge Systems Discussion
Complete the following assignment in one MS word document:Chapter 12 –discussion question #1-3 & exercise 1 & 12 & 16Cha ...
University of Cumberland Wk7 Business Intelligence Knowledge Systems Discussion
Complete the following assignment in one MS word document:Chapter 12 –discussion question #1-3 & exercise 1 & 12 & 16Chapter 13- discussion question #1-4 & exercise 3 & 4 & 6It must be in APA format
AMU Computer Science Data Network Vulnerabilities Paper
Within the attached article, the authors state there are "two new denial of service (DoS) vulnerabilities in cellular data ...
AMU Computer Science Data Network Vulnerabilities Paper
Within the attached article, the authors state there are "two new denial of service (DoS) vulnerabilities in cellular data services." What are these two new vulnerabilities? Give a short description to explain what they are. Give an example of each one of the vulnerabilities becoming exploits under attack.
4 pages
Computer Forensics
Question # 1: What are Computer Forensics and what different areas of Computer (or Digital as Computer Forensics or Comput ...
Computer Forensics
Question # 1: What are Computer Forensics and what different areas of Computer (or Digital as Computer Forensics or Computer Forensics Science is the ...
500 words to answers 6 questions
I have 6 questions that need to be answered by 500 words. the are about the hard ware.they need to be answered clearly
500 words to answers 6 questions
I have 6 questions that need to be answered by 500 words. the are about the hard ware.they need to be answered clearly
Similar Content
New England College Database and Computer Security Essay
1. Research what kind of information cookies store. You might find the following websites helpful:www.allaboutcookies.org...
Saudi Electronic University Databases Questions
Instructions:You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackbo...
buffer overflow and software security
...
Data communications and networking, computer science assignment help
After watching the videos, Fibre (Fiber) vs Copper as Fast As Possible and Tri Band WiFi as Fast As Possible, discuss at l...
University of Cumberlands Future Trends in Information Technology Questions
Question:
If you were to explain to a family/friend about Information technology, what would you say is its impor...
CYS663 SEU Software as a Service Discussion
During this module, you explored the topics of trends and future directions. Over the years, several models for selling so...
Swot Analysis
Family planning is a vital process in developing a thriving economy. A fast-growing population is likely to affect growth ...
Discussion Posts Cs
TOPIC 1: Risk of sharing last 4 digits of your SSN Well explained. The perception the majority of the population has that ...
Cloud Computing Discussion.edited
Platform as a Service (PaaS) is one of the cloud computing categories in the development and distribution field through wh...
Related Tags
Book Guides
The Two Towers
by J. R. R. Tolkien
Fear - Trump in the White House
by Bob Woodward
The Picture of Dorian Gray
by Oscar Wilde
Broke Millennial: Stop Scraping by and Get Your Financial Life Together
by Erin Lowry
Shattered - Inside Hillary Clintons Doomed Campaign
by Amie Parnes and Jonathan Allen
Girl Stop Apologizing
by Rachel Hollis
Bridge to Terabithia
by Katherine Paterson
The Woman in the Window
by A. J. Finn
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
ISSC 642 Central Texas College Killing with Keyboards Discussion and Responses
This is a two part questions. First I will need the discussion question answer which will be below in bold, 300 words APA ...
ISSC 642 Central Texas College Killing with Keyboards Discussion and Responses
This is a two part questions. First I will need the discussion question answer which will be below in bold, 300 words APA format. For those response I will need two responses of at least 175 words each.
Please look at the killing with keyboards file then answer the following questions in the context of the best practice concepts covered in chapter 11 and the security professional proficiencies covered in chapter 13. Identify what is at risk here, 5 possible threats and 5 vulnerabilities in this scenario. Analyze measures that could be taken to reduce the risks.
Part two
Student one:
I hope all is well and you are excited to be moving into week 5 of this course. This week, we are able to use our readings and apply it to a training I have seen a few times now. This is a great example of how a bunch of information can be pulled together to get a better picture.
After reviewing “Killing with Keyboards” we are asked to answer these questions:
What is at risk here?
Identify 5 possible threats, and 5 vulnerabilities in this scenario
Discuss measures that could be taken to reduce the risks.
The risk in this situation is not only one but could be many. The first and one that stands out to me the most is lives of the family. Along with family, there are also risk of others. Moving down on my own priority list is risk of leaking sensitive information hurting the organization but also the individual with possible loss of position and clearance. This scenario is an example of aggregation. They put a bunch of what looks like basic information together making it deemed to be a higher classification such as name, family, organization, address, phone numbers, and so on.
Vulnerabilities
The Internet is an open-source tool that anyone can use for potential harmful tasks.
Not being aware of your surroundings at all times.
Social media and Blog Sites can use fake or anonymous accounts. Example of possible social engineering
Disclosure of too much information. Aggregation of unclassified information to produce a classification of secret material.
Utilizing same username and password in many places. This is due to brute force attacks and a single point of failure.
Threats
Users on Social Media and Blog Sites. Due to being able to be anonymous, all users pose a threat to the information you share.
Foreign Government. In this situation, a foreign government is a threat exploiting persistent attack.
The individual is a threat as well. By disclosing information and talking about sensitive topics, he is a threat to the organization.
Public Wi-Fi is a threat because you never know the type of security that it has implemented. Also once you have a password or access, a hacker can begin monitoring all traffic on that network.
Individual met at the unclassified conference is a threat. This individual is a threat to himself, family, information, and the organization.
Preventative Measures
Completed information security training whether that be annual, semi-annual, or quarterly.
Review all information posted on social media. This needs to be done by all individuals no matter the type of work conducted or the organization you work for. Keeping yourself safe is more important than sharing on social media.
Review all information posted about position, project, and more. Best practice is to just not post anything about work. This is mainly focused at blog sites due to the threat they can have.
Do not discuss work with strangers and report to security if they are asking to detail of questions
Understand that because of a clearance everything you do and say become information that someone wants.
Before going on a trip, get security briefings on what to do in different situations you may be faced with
I look forward to reading all your comments and hope you have a great rest of your week.
Reference
Bejtlich, R. (2004). The Tao of Network Security Monitoring: Beyond intrusion detection. Boston, MA: Addison-Wesley.
Segal, C. (n.d.). 8 Cyber Security Best Practices For Your Small To Medium-Size Business. Retrieved March 31, 2020, from https://www.coxblue.com/8-cyber-security-best-prac...
Top 10 Secure Computing Tips. (n.d.). Retrieved March 31, 2020, from https://security.berkeley.edu/resources/best-pract...
Student two:
This presentation was awesome. I have tried many times in explaining to my family, being in the military myself with knowledge, numerous times about posting crumbs on the internet. I will be showing this presentation with the hope that this helps it sink in a it. I will also be showing it to my soldiers. What is at risk here? There are s couple of things that are at risk. The upmost important factor that was at risk was the family. That picture was terrifying. Secondly, the lives of our servicemen and women. Third, the information that was supposed to be confidential. What were some possible threats? One, a foreign government training child to search the internet for vital information. Two, social media. The individual himself was a threat. Three, He was complacent. Four, He talked about classified information with an unknown person. Five, the man at the conference was the final threat. He even had pictures of his family to show Chris if he didn’t get the information organically. What are some vulnerabilities in this scenario? One, let’s start with the individual himself. He was complacent, which makes hm vulnerability to threats. Two, he was lonely at the conference and just wanted someone to talk to and saw a fellow with like interest. Three, social media is always a vulnerability. Four, free Wi-Fi. Five, just the internet itself can make you vulnerability. As in the presentation, everything is one there posted from other sources and then can be compiled to make a profile, big data. Some of these risks can be reduce by be aware of what you are posting on social media and what others are posting about you or with you in social media. Taking the security briefings more seriously and quit thinking they are a joke or outdated. Talk to your security personal about what precautions to take when out of town, like at a conference. It is ok to talk to new people but not ok to talk about classified information even if they brought it up first.
GCU Python Steganography Multi Variate Encoding Paper
The purpose of this assignment is to demonstrate steganographic encryption using Python.Locate and obtain the collaged pho ...
GCU Python Steganography Multi Variate Encoding Paper
The purpose of this assignment is to demonstrate steganographic encryption using Python.Locate and obtain the collaged photo from Topic 6.Encrypt the simple text message "Gotcha!" into the photo.Use the completed collage photo from Topic 6.Generate a secret text message. Picture of the message must be the same size as the collaged picture.Use Python to create and implement a steganography algorithm that will embed the message within the collage photo. [encode]In a separate program, prompt the user to decode the steganography algorithm and provide the decode functionality to match. [decode]Submit the following in compressed, zip file format:Your 2 Python programs. Naming convention is: firstInitial+lastName+StegoEncode.py and firstInitial+LastName+StegoDecode. Example: dHaralsonStegoEncode.py and dHaralsonStegoDecode.pyAt least one screen capture per program demonstrating that each of your programs were functional.Original message file, original picture, encoded picture and decoded picture.ZIP file naming convention is: firstInitial+lastName+stego.zip
University of Cumberland Wk7 Business Intelligence Knowledge Systems Discussion
Complete the following assignment in one MS word document:Chapter 12 –discussion question #1-3 & exercise 1 & 12 & 16Cha ...
University of Cumberland Wk7 Business Intelligence Knowledge Systems Discussion
Complete the following assignment in one MS word document:Chapter 12 –discussion question #1-3 & exercise 1 & 12 & 16Chapter 13- discussion question #1-4 & exercise 3 & 4 & 6It must be in APA format
AMU Computer Science Data Network Vulnerabilities Paper
Within the attached article, the authors state there are "two new denial of service (DoS) vulnerabilities in cellular data ...
AMU Computer Science Data Network Vulnerabilities Paper
Within the attached article, the authors state there are "two new denial of service (DoS) vulnerabilities in cellular data services." What are these two new vulnerabilities? Give a short description to explain what they are. Give an example of each one of the vulnerabilities becoming exploits under attack.
4 pages
Computer Forensics
Question # 1: What are Computer Forensics and what different areas of Computer (or Digital as Computer Forensics or Comput ...
Computer Forensics
Question # 1: What are Computer Forensics and what different areas of Computer (or Digital as Computer Forensics or Computer Forensics Science is the ...
500 words to answers 6 questions
I have 6 questions that need to be answered by 500 words. the are about the hard ware.they need to be answered clearly
500 words to answers 6 questions
I have 6 questions that need to be answered by 500 words. the are about the hard ware.they need to be answered clearly
Earn money selling
your Study Documents