Question

QUESTION 1 Advanced Security Inc. was hired by the Treasury Bank Inc. for securing their systems....

QUESTION 1 Advanced Security Inc. was hired by the Treasury Bank Inc. for securing their systems. The first thing they did was implement the best practice if separation of domains. As a result of this The bank had to get a new domain name. any change made in the records points to only one party who could have made that change. If you are a technical person, you must have office in a particular area of the building. accessing outside websites depends on whether this website is within the domain of company business. 10 points QUESTION 2 When the company management met the Chief Information Office (CIO) last week, one of the managers pointed out that the CIO himself should be mindful of the least privilege principle in using the information technology. She gave the example of violation by saying that the CIO had done least work that will do the job (that is, least privilege) instead of going above and beyond. the CIO has not distributed his power among his sub-ordinates to implement least privilege by keeping least power to himself. the CIO uses root (highest privileged account) for casual email communications that does not require high privilege level. the CIO does not provide enough information about system security as a least privilege practice. 10 points QUESTION 3 In answer to a question 'it is a surprise, why don't we have all the features of the new software enabled', the IT engineer explained that we will use only the ones we need for the business operation, so that we expose least attack vectors. This practice is called minimization of implementation. secrecy about the IT potential of a software. usability. least astonishment. 10 points QUESTION 4 When the Financial Transactions Inc. ATM machine broke down, it started giving out money for any code entered. Shopping for the new ATM machine, they want to make sure that its design follows least privilege principle so that the ATM can't give money to anyone except the designated parties. minimization of implementation principle so that there are no features of giving out money except for a minimum number of scenarios. Usability so that it knows that there is a valid customer before giving out money. fail safe defaults or fail secure operation so that if it fails it defaults to a secure state. 10 points QUESTION 5 Kerckhoff's principle requires that there should be no secrecy in the design of an encryption algorithm because if adversary can break it, it is no good and if she can't break it then is proven to be good. This has led to the following design practice to be followed in cipher suites. fail safe usability open design minimization (of implementation) 10 points QUESTION 6 An operating system consists of three rings of resources. The programs in ring 2 are accessible by users and guest users. Programs in ring 1 are accessible by device drivers and users with special privilege that requires them of enter two passwords. The programs in ring 0 make the kernel of the OS and require three passwords for human access, the first password giving access to only the 'user land' area, the second password giving access to the 'device land' area and the third password giving access to the 'kernel'. When someone makes more than two errors of entering password at the device land or kernel levels, an email is sent to the administrator warning of the unsuccessful attempt to login as administrator. This protects against many attacks. This type of protection can be described as multiple firewalls. defense in depth. honeypot. no man's land. 10 points QUESTION 7 Most smart phones now provide a mechanism to authenticate the users. A loose form of authentication on smart phones is swiping a certain pattern or entering a four-digit PIN. Modern systems can identify an individual using biometrics. can't identify specific individual but can only check for a password. don't provide an authentication mechanism because anyone could be using them. don't work without at least a 2-factor authentication. 10 points QUESTION 8 Activity logging and monitoring is a powerful secure design principle. Suppose you get an email from a close relative saying 'here are family photos'. You click on the link provided in the email only to find out that it was a phishing attack. You quickly checked your login activity and find that you are currently logged in from a foreign country. Realizing that you have been 'phished' you should call the police right away. call network administrator right away. logout and shut down your computer right away. login (if possible, from anther device) and change your password right away. 10 points QUESTION 9 As a security engineer, you are afraid that if there is any breach into your employers data, the whole data becomes fishy. One solution to this is that you always keep two copies of the main server data so that if one is tampered with the other can be used.The other approach is that you keep a copy of the secure hash of the database in a secure place and anytime you try to use the database you first check its secure hash. This later approach eliminates the need to keep a second copy as a backup. Later approach is no sufficient because you should always have a backup of important data. If you can catch a tampering event then you need to recover from it by using the backup. The later appproach is called auditing and it is necessary anyway. The first approach (having a backup) is called auditing and is required anyway. 10 points QUESTION 10 Two-factor authentication can be broken if while riding the bus you use your password to login to your account and someone can shoulder-surfs your password and then pick-pockets your phone. You are going to use this example to your employees as part of training them to avoid social engineering attacks. DDoS attacks. spear phishing. least privilege practice. 10 points QUESTION 11 (With this question correct you can get 100/100) Auditing is important because it tells you who used the system at what time. it saves money because emploeeys will spend carefully. it makes sure that duties are separated in individual domains. it can help you avoid unwanted ads.

Homework Answers

Answer #1

Question 1: The step taken to seperate the domain was good step to increase the security of the website and bank system , and in order to access the website that are outside the domain , we should have an internet connection and have a a proper routing devices that will route the devices to outside websites and restrict the traffic from the outside of the domain which try to access the website and in order to access the bank system or website from outside , there will be need of username and password for authetication of the user and verify their identity to keep out the intruders. Addition of domain does not have great effect on the records because we only need to link the domain to server and allow access to it in the server.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Please answer the following questions and upload your answers om a file. 1. Consider the availability...
Please answer the following questions and upload your answers om a file. 1. Consider the availability of various items related to a smart phone (data, voice, apps, and other services). What would be different ways to attack the availability of the phone? (10 points) 2. What would be ideal ways to defend against availability attacks you described in question number 1. (10 points) 3. A company requires employees to set 20 digit passwords, with letters, special characters, numbers, and asks...
Question 21 ​By default, most wireless networks are ____. a. ​secured by WEP b. ​password-locked c....
Question 21 ​By default, most wireless networks are ____. a. ​secured by WEP b. ​password-locked c. ​secured by WPA or WPA2 d. ​left unsecured 1 points Question 22 ​Choosing Image Editing and Illustration Programs a. ​non-lossy b. ​linear c. ​bitmap d. ​vector 1 points Question 23 ​Computer-generated graphics come in two varieties: ____ and vector. a. ​linear b. ​raster c. ​angular d. ​digital 1 points Question 24 ​Currently, WWANs provide wireless connections to the Internet using ____ networks created by...
QUESTION 1 1. Brianna is trying to increase her chances of being promoted to vice president...
QUESTION 1 1. Brianna is trying to increase her chances of being promoted to vice president by working to build good work relationships with other managers outside her own department. Brianna's behavior should be viewed as dysfunctional politics. functional politics. coercive power. functional influence. 2 points QUESTION 2 1. The Gingerbread Factory has a separate unit that makes their chocolate crunch cookies and another unit that is completely responsible for all operations in producing their ginger snap cookies. The Gingerbread...
Question 1 of 15 Which of the following is not a recommended starting point to enter...
Question 1 of 15 Which of the following is not a recommended starting point to enter sales of products/services? A. Quick Create > Invoice B. Register > New transaction C. Quick Create > Sales Receipt D. Customer detail page > New transaction E. Transactions > Sales > New transaction Question 2 of 15 Which of the following statements accurately describes bank rules? A. Bank rules are imported from the Bank's website into the For Review tab in the Banking Center...
Plagiarism Certification Tests for Undergraduate College Students and Advanced High School Students These tests are intended...
Plagiarism Certification Tests for Undergraduate College Students and Advanced High School Students These tests are intended for undergraduate students in college or those under 18 years of age. Read these directions carefully! The below test includes 10 questions, randomly selected from a large inventory. Most questions will be different each time you take the test, You must answer at least 9 out of 10 questions correctly to receive your Certificate. You have 40 minutes to complete each test, and you...
2. SECURING THE WORKFORCE Diversity management in X-tech, a Japanese organisation This case is intended to...
2. SECURING THE WORKFORCE Diversity management in X-tech, a Japanese organisation This case is intended to be used as a basis for class discussion rather than as an illustration of the effective or ineffective handling of an administrative situation. The name of the company is disguised. INTRODUCTION In light of demographic concerns, in 2012, the Japanese government initiated an effort to change the work environment in order to secure the workforce of the future. Japan is world renowned for its...
Item 1 In the case below, the original source material is given along with a sample...
Item 1 In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button. Original Source Material Student Version Major changes within organizations are usually initiated by those who are in power. Such decision-makers sponsor the change and then appoint someone else - perhaps the director of training - to be responsible for implementing and managing change. Whether the appointed change agent is in...
Using the model proposed by Lafley and Charan, analyze how Apigee was able to drive innovation....
Using the model proposed by Lafley and Charan, analyze how Apigee was able to drive innovation. case:    W17400 APIGEE: PEOPLE MANAGEMENT PRACTICES AND THE CHALLENGE OF GROWTH Ranjeet Nambudiri, S. Ramnarayan, and Catherine Xavier wrote this case solely to provide material for class discussion. The authors do not intend to illustrate either effective or ineffective handling of a managerial situation. The authors may have disguised certain names and other identifying information to protect confidentiality. This publication may not be...
Delta airlines case study Global strategy. Describe the current global strategy and provide evidence about how...
Delta airlines case study Global strategy. Describe the current global strategy and provide evidence about how the firms resources incompetencies support the given pressures regarding costs and local responsiveness. Describe entry modes have they usually used, and whether they are appropriate for the given strategy. Any key issues in their global strategy? casestudy: Atlanta, June 17, 2014. Sea of Delta employees and their families swarmed between food trucks, amusement park booths, and entertainment venues that were scattered throughout what would...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT