preview

minor case Essay

Decent Essays

Question 1
a) Distinguish between an IP address and a port address. Your answer should describe the general packet structure (with diagram), which layers of the TCP/IP-OSI relate to IP address and port address, and how the IP address and port address ensure correct delivery of the packet.
They are both necessary for correctly routing traffic to its destination but have different scope. An IP address identifies a particular computer on the Internet. The port number identifies a particular program running on that computer.

b) List the five ‘quality of service’ parameters that we have discussed this semester and that form a central platform in information security management. Concisely explain the meaning of each of these …show more content…

What is considered to be the best of these policies – and why?
1. Defend
• Attempts to prevent exploitation of the vulnerability
• Preferred approach
• Accomplished through countering threats, removing asset vulnerabilities, limiting asset access, and adding protective safeguards
2. Transfer
• Control approach that attempts to shift risk to other assets, processes, or organizations
3. Mitigate
• Attempts to reduce impact of vulnerability exploitation through planning and preparation
4. Accept
• Doing nothing to protect vulnerability and accepting the outcome of its exploitation
• Valid only when the particular function, service, information, or asset does not justify cost of protection
5. Terminate
• Directs the organization to avoid those business activities that introduce uncontrollable risks
• May seek an alternate mechanism to meet customer needs

The best policy will be defending policy which detect and eliminate vulnerability at the very beginning.

e) It is essential that information system security professionals have a sound understanding of what may seem to be variations in risk management approaches.
Consequently you are asked to analyse and contrast the risk management content of chapter 4 of the set text with the NIST Special Publication on risk management
(“Risk Management Guide for Information Technology Systems”) which is available on the subject’s Blackboard site in PDF. Your analysis

Get Access