Question 1
a) Distinguish between an IP address and a port address. Your answer should describe the general packet structure (with diagram), which layers of the TCP/IP-OSI relate to IP address and port address, and how the IP address and port address ensure correct delivery of the packet.
They are both necessary for correctly routing traffic to its destination but have different scope. An IP address identifies a particular computer on the Internet. The port number identifies a particular program running on that computer.
b) List the five ‘quality of service’ parameters that we have discussed this semester and that form a central platform in information security management. Concisely explain the meaning of each of these
…show more content…
What is considered to be the best of these policies – and why?
1. Defend
• Attempts to prevent exploitation of the vulnerability
• Preferred approach
• Accomplished through countering threats, removing asset vulnerabilities, limiting asset access, and adding protective safeguards
2. Transfer
• Control approach that attempts to shift risk to other assets, processes, or organizations
3. Mitigate
• Attempts to reduce impact of vulnerability exploitation through planning and preparation
4. Accept
• Doing nothing to protect vulnerability and accepting the outcome of its exploitation
• Valid only when the particular function, service, information, or asset does not justify cost of protection
5. Terminate
• Directs the organization to avoid those business activities that introduce uncontrollable risks
• May seek an alternate mechanism to meet customer needs
The best policy will be defending policy which detect and eliminate vulnerability at the very beginning.
e) It is essential that information system security professionals have a sound understanding of what may seem to be variations in risk management approaches.
Consequently you are asked to analyse and contrast the risk management content of chapter 4 of the set text with the NIST Special Publication on risk management
(“Risk Management Guide for Information Technology Systems”) which is available on the subject’s Blackboard site in PDF. Your analysis
In general, an IP address along with a port number forms a socket. Figure 3.10 shows the
* Recommend other IT security policies that can help mitigate all known risks, threats, and
3.) What are the parts of TCP/IP and what do they do? Who is the primary user of TCP/IP?
Briefly describe how the policy will address system back up and recovery, access control, and quality of service.
An effective security policy consists of many polices which address specific areas within the business. These policies are designed to
The company can prevent, remediate, or mitigate the attacks. During the establishment of prevention and
This is to eliminate threats exercising a vulnerability system. This leads into the next category known as control methods. Security controls utilize both technical and nontechnical methods. Technical controls serve as safeguards that are implemented into computer hardware, software, or firmware. Nontechnical controls serve at more of a managerial and operational capacity for instance security policies, operational procedures, physical and environmental security as well as personnel. Control categories for technical and nontechnical are categorized based from control categories. These two categories are known as Preventive and
Lee Chambers, the Defendant was driving 10 km over the speed limit while making pizza deliveries using the company van. To avoid hitting a dog, he had incidentally skidded sideways on a patch of ice and crashed into another vehicle. Alice White, the plaintiff who was not wearing a seatbelt at the time had suffered numerous injuries. The Plaintiff had sued Lee Chambers and Vinnie’s Pizza Ltd. for general and special damages along with cost of car repairs, and loss of income.
3. How does a client app identify a server app on another computer on the network? Transmission Control Protocol (TCP) & Internet Protocol (IP)
With the increasing use of technology today with computers, there are better ways we can came up with to stop vulnerabilities in a network. As organizations increase their reliance on, possibly distributed, information systems for daily business, they become more vulnerable to security breaches even as they gain productivity and efficiency advantages. Network security is the becoming more important to a business because of the networks and applications. You never know when someone is coming for your business system. Looking at every strategy you have going on for your business. Need to have the set of tools for the security walls to be high. When dealing with hackers or competition all servers not to be access easily. There is a large amount
"Something that has been mentioned indirectly a few times already is the concept of defense in depth. The concept of defense in depth originated from the military and was seen as a way to delay rather than prevent an attack. As an information security tactic, it is based on the concept of layering more than one control. These controls can be physical, administrative, or technical in design. We have looked at a variety of physical controls in this chapter such as locks, doors, fences, gates, and barriers. Administrative controls include policies
Effective and efficient security practices are anchored on strong policies and procedures. It is always prudent to ensure that underlying policies are firm in place to guarantee the success of the process. Both the policies and the
TCP/IP stands for transmission control protocol/ internet protocol. TCP/IP is responsible for how devices like computers should be connected over the internet and how data should be transmitted from one computer to another. The IP essentially functions by exchanging set of information which is called packets. Packets are short structures of bytes which contains of headers and body. The body only contains the application data. The headers keep on sending the information back on forth until the data is sent to the right destination, the packets can usually send in the wrong order this means that the data was crashed by the firewall or data was destroyed while sending information.TCP is the transmission communication protocol which delivers packets to the accurate to destination.
Before going further on this document, first we need discuss some basics of networking, so that it would be easy to understand the topics easily.
Improve security by deploying a second generation anti virus software, educate users on cyber safety and follow a security framework for processes and policies