ESS.OF MIS W/MYMISLAB+MYITLAB >IC< >LL
2nd Edition
ISBN: 9781323482476
Author: LAUDON
Publisher: PEARSON C
expand_more
expand_more
format_list_bulleted
Question
Chapter 8, Problem 8HMP
Program Plan Intro
System vulnerability:
- When huge data amounts are been kept in electronic form, it becomes susceptible to many threats.
- The
information systems in many locations are been interconnected through communication networks. - The unauthorized access can occur at many access points in network and is not limited to single location.
- The data flowing over networks could be accessed; valuable information could be stolen while transmission or data could be altered without authorization.
- The denial-of-service attacks are launched by intruders to disrupt website operations.
- Internets are vulnerable than internal networks as it is open to everyone.
Explanation of Solution
Impact on business:
- A risk assessment is to be performed to determine impact on business.
- The value of information assets, vulnerability ...
Explanation of Solution
Steps to prevent damage:
- The steps taken to prevent website damages includes:
-
o Access controls:
- It prevents improper access to system of organization.
- The unauthorized users would be restricted using this method.
-
o Firewalls:
- It prevents access of private networks from unauthorized users.
-
o Intrusion detection systems:
- The monitoring tools are placed at most vulnerable points, It detects and deters intruders for system.
-
o Antivirus program:
- The software program that checks systems and drives for presence of virus...
-
o Access controls:
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Take a look at the websites of three major technology businesses (Microsoft, Oracle, and Cisco) as well as two more sites of your choosing.Investigate the internet's most efficient security measures.After this event, what new insights about yourself have you gained?
Provide an explanation of how firewalls can protect your business. How do hardware and software firewalls compare, and why would you choose to use one over the other? What sorts of applications do you use to assess the integrity of your company's IT infrastructure? Is it possible to circumvent a website's web filtering function in any way?
Zero Trust has become one of cybersecurity’s latest buzzwords, but what does it mean?
Read through this brief from PaloAlto Networks describing the latest cybersecurity strategy:
Zero Trust is a strategic initiative that helps prevent successful data breaches by eliminating the concept of trust from an organization’s network architecture. Rooted in the principle of “never trust, always verify,” Zero Trust is designed to protect modern digital environments by leveraging network segmentation, preventing lateral movement, providing Layer 7 threat prevention, and simplifying granular user-access control. Zero Trust was created by John Kindervag, during his tenure as a vice president and principal analyst for Forrester Research, based on the realization that traditional security models operate on the outdated assumption that everything inside an organization’s network should be trusted. Under this broken trust model, it is assumed that a user’s identity is not compromised and that all…
Chapter 8 Solutions
ESS.OF MIS W/MYMISLAB+MYITLAB >IC< >LL
Knowledge Booster
Similar questions
- Discuss the ways in which firewalls may help secure your company. What are the benefits and drawbacks of utilizing hardware and software firewalls? To evaluate the security of your company's computer infrastructure, what software tools do you use? What are the best ways to get around web filtering software?arrow_forwardcreate a security exercise utilizing two or more of the exercises types (red team, blue team, white team, purple team) discused in the assigned chapter readings. Detail your scenario, your use of at least 2 teams and how you will carry out the exercise to test your clients network security. what teams will be used? what roles will they play? use the courses microsoft word memo templatarrow_forwardAssuming you have been employed to lead a cyber security consultant for a company that performs penetration testing and advice businesses from the report on how to avoid cyber-attacks, use the knowledge you have acquired in performing the following task on two different websites. Using vega software, perform a vulnerability assessment of site 1 and site 2 listed below. It is the same site that can be accessed via http and HTTPS. Site 1 : http://team.critacghana.com Site 2: https://team.critacghana.com Discuss the High, Medium, and Low Risks results obtained from the reports generated by Vega. Present technical solutions to a non-technical audience in industry-standard format concepts based on your findings. Provide five recommendations for five critical risks identified out of the scanning. The connection with the HTTPS is encrypted using TLS_AES_256_GCM-SHA384, 256-bit keys, TLS 1.3. Discuss four advantages of using TLS 1.3. Discuss three importance of performing Ethical hacking.…arrow_forward
- Discuss at least four (4) internet security best practises and how their adoption might assist minimise internet user vulnerability.arrow_forwardA study researcher has noticed an issue called "security failures in social media" and wants to investigate it further. What are the actions he should take to do his research? Briefly describe each process.arrow_forwardPlease I need to answer this question. The book's name is: "Network Security, Firewalls, and VPNS, 2e". Thank you. Question: What are some of the differences between vulnerability scanning and penetration testing? What are some of the tools that can be leveraged to perform each and their methods?arrow_forward
- Imagine that you are in charge of developing a fast-growingeducational startup’s e-commerce presence. What do you think are the 5 most potentially damaging types of attacks aimed at us?arrow_forwardIn the context of wireless network security, explore the vulnerabilities associated with open networks, WEP encryption, and the WPS (Wi-Fi Protected Setup) feature. How can these vulnerabilities be mitigated?arrow_forwardBriefly describe the following terms: Threat, Vulnerability, Exploit, Safeguard, and Target. How are they are linked together (ie What is the goal?).2) What is the purpose of a username? password? What is two factor authentication? Provide an example of two factor authentication. Describe biometrics.3) What is a perimeter firewall vs an internal firewall vs a host based firewall? What is Defense in Depth?4) What is encryption? What are the two forms of Briefly describe each.5) Briefly describe the 5 steps for symmetric encryption.arrow_forward
- Outline the benefits of using firewalls to protect your company. What are the pros and cons of firewall protection, both physical and virtual? When doing an audit of your network's safety, what program do you use? What are the most effective means of evading web filters?arrow_forwardExplore the security vulnerabilities in wireless networks, including KRACK attacks and the importance of strong encryption protocols like WPA3.arrow_forwardDiscuss at least four (4) internet security best practices and how their adoption would assist reduce internet user vulnerability.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningManagement Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,