Information Security, computer science homework help

User Generated

znephf0811

Computer Science

Description

6-2 Scenario Assignment Module Six: Gathering Quantities Data

In your role as a highly paid consultant, you are given a list of potential threats to and vulnerabilities of the current communication security protocols of an organization. You are asked to provide quantitative data to measure the likelihood that any of these threats will actually occur for the information assets of the client. Conduct research and describe resources you found that might provide insight into measuring the likelihood that some of the threats would actually occur. In the explanation, include whether you see a trend in resources that might indicate a specific industry is particularly involved in gathering this kind of data. Additionally, evaluate which communication security protocols are more effective and provide an explanation.

For additional details, please refer to the Scenario Assignment Module Six Guidelines and Rubric document in the Assignment Guidelines and Rubrics section of the course.

Unformatted Attachment Preview

IT 549 List of Possible Threats/Vulnerabilities  Spoofing is attempting to gain access to a system by using a false identity. This can be accomplished using stolen user credentials or a false IP address. After the attacker successfully gains access as a legitimate user or host, elevation of privileges or abuse using authorization can begin.  Tampering is the unauthorized modification of data, for example, as it flows over a network between two computers.  Repudiation is the ability of users (legitimate or otherwise) to deny that they performed specific actions or transactions. Without adequate auditing, repudiation attacks are difficult to prove.  Information disclosure is the unwanted exposure of private data. For example, a user views the contents of a table or file he or she is not authorized to open, or monitors data passed in plain text over a network. Some examples of information disclosure vulnerabilities include the use of hidden form fields, comments embedded in webpages that contain database connection strings and connection details, and weak exception handling that can lead to internal system-level details being revealed to the client. Any of this information can be very useful to the attacker.  Denial of service is the process of making a system or application unavailable. For example, a denial of service attack might be accomplished by bombarding a server with requests to consume all available system resources or by passing it malformed input data that can crash an application process.  Elevation of privilege occurs when a user with limited privileges assumes the identity of a privileged user to gain privileged access to an application. For example, an attacker with limited privileges might elevate his or her privilege level to compromise and take control of a highly privileged and trusted process or account.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Surname 1

Contents
Gathering Quantities Data..............................................................Error! Bookmark not defined.
Works Cited ...................................................................................Error! Bookmark not defined.


Surname 1
Student’s Name
Professor’s Name
Course Title and Code
Date of Submission
Gathering Quantities Data
Early in 2016, Desmond Schmidt and his colleagues took a survey on Global Navigation
on Satellite System (GNSS) spoofing attacks and came up with conclusions on exact nature of
threat scenarios, the effectiveness of proposed defense against such spoofing and practical
impediments highly that are, in most cases, ignored that allow GNSS spoofing attacks. In their
analysis, they suggest that spoofing has potential to attack Smart Grip power management
systems among other mobile phone infrastructure systems. They also stated that in most cases,
companies ignore the relevance of installing GNSS anti-spoofing jammers, which are reasonably
costly at the expense of their largely complex systems, and highlighted that it is important to
have more than just jammers in order to secure systems with...


Anonymous
Just what I needed. Studypool is a lifesaver!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags