Preview

homework 1

Satisfactory Essays
Open Document
Open Document
454 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
homework 1
NT2580 Introduction to Information Security

Unit 1 Assignment 1: Match Risks/Threats to Solutions

Assignment Requirements
This is a matching activity. You will receive the Match Risks/Threats to Solutions worksheet, which contains a numbered list of common risks and threats found in a typical IT infrastructure. You must enter the letter for the correct solution or preventative action in the blank to the right of each risk or threat.

Write the letter of the correct solution or preventative action in the blank to the right of each risk or threat.

Risks or threats:
1. Violation of a security policy by a user ____C____
2. Disgruntled employee sabotage ____I____
3. Download of non-business videos using the
Internet to an employer-owned computer ____A____
4. Malware infection of a user’s laptop ____L____
5. Unauthorized physical access to the LAN ____N____
6. LAN server operating system vulnerabilities ____F____
7. Download of unknown file types from unknown sources by local users ____B____
8. Errors and weaknesses of network router, firewall, and network appliance configuration file ____H____
9. WAN eavesdropping ____M____
10. WAN Denial of Service (DoS) or Distributed Denial of
Service (DDoS) attacks ____D____
11. Confidential data compromised remotely ____G____
12. Mobile worker token stolen ____K____
13. Corrupt or lost data ____E____
14. Downtime of customer database ____J____

Solutions or preventative actions:
A. Enable content filtering and antivirus scanning at the entry and exit points of the Internet. Enable workstation auto-scans and auto-quarantine for unknown file types.
B. Apply file transfer monitoring, scanning, and alarming for unknown file types and sources.
C. Place employee on probation, review acceptable use policy (AUP) and employee manual, and discuss status during performance reviews.
D. Apply filters on exterior Internet Protocol

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Psy/250 Appendix G

    • 398 Words
    • 2 Pages

    Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat.…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Homework #1

    • 251 Words
    • 1 Page

    1)Farmer Brown produces eggs and milk on his farm. He initially produces at point A. He would like to produce the same amount of eggs per day and increase his milk production by one gallon per day. Is it possible? Why or Why not?…

    • 251 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    Cjs 250 Appendix G

    • 288 Words
    • 2 Pages

    Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat.…

    • 288 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Homework 3

    • 830 Words
    • 4 Pages

    Molecule x blocked the ion channel receptor site so acetylcholine could not attach therefor not allowing the muscle to ultimately contract.…

    • 830 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    The user domain is the employees who access the organization network and IT infrastructure. There should be a policy in place that defines what the employee can do inside the organization. A employee handbook would be beneficial and should list all of the guidelines and procedures. Many smack threats can be avoided by the lack of knowledge and security violations. Reminders like emails and periodic meetings can help employees be more aware about threats and technology updates. If there is a security violation the employee should be under watch and have a meeting with their supervisor. Employee’s daily usage should also be supervised periodically to…

    • 347 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Apply email server and attachment antivirus/malware and email quadrating for unknown file types. Disable for ping, probing, and port scanning on all exterior IP devices. Denying of outbound traffic using source IP addresses. Apply file transfer monitoring, scanning and alarming for unknown file types. Web Surfing should be monitored by filtering out any unknown IP address with trusted cites. Apply domain-name content filtering at the internet entry/access point as well.…

    • 313 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt280 Week 1 Homework

    • 359 Words
    • 2 Pages

    C. Place employee on probation, review acceptable use policy (AUP) and employee manual, and discuss status during performance reviews.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    CJS 250 Appendix G

    • 603 Words
    • 3 Pages

    Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat.…

    • 603 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    4. What tasks and deliverables are needed to implement your risk mitigation recommendations? Pick one of the seven domains of a typical IT infrastructure and answer uniquely.…

    • 960 Words
    • 4 Pages
    Good Essays
  • Better Essays

    NT2580 Graded Assignments

    • 5288 Words
    • 22 Pages

    This is a matching activity. You will receive the Match Risks/Threats to Solutions worksheet, which contains a numbered list of common risks and threats found in a typical IT infrastructure. You must enter the letter for the correct solution or preventative action in the blank to the right of each risk or threat.…

    • 5288 Words
    • 22 Pages
    Better Essays
  • Satisfactory Essays

    Homework 7

    • 932 Words
    • 4 Pages

    Go to the list of datasets located on the website http://wps.aw.com/aw_stock_ie_3/178/45691/11696965.cw/index.html . Right-click the one named “Guns Data (Stata dataset)”, save it somewhere you can access it and then open it in Stata. This dataset contains panel data from 50 states plus the District of Columbia for the years 1977 through 1999. A detailed description is given in the file “Guns Data Description (PDF)” on the same page. We are interested in the effects of “shall-issue” laws relating to concealed handguns. The variable “shall” is 1 if a state has such a law, 0 otherwise. States that have “shall-issue” laws *shall* (i.e., must) give a concealed gun permit to anyone that wants one (and isn’t a felon, mentally incompetent). States that do not have “shall-issue” laws may issue permits, but generally do so only to certain types of people (i.e., their laws are much stricter). Proponents of “shall-issue” laws argue that they will reduce crime, because criminals will be deterred by the knowledge that some people are carrying guns. Critics argue that “more guns means more crime”. 1. The outcome we will analyze is the log of violence (i.e., you need to create a variable such as ln_vio using a command such as “gen lnvio=ln(vio)”. Why is it convenient to use the log of violence as the outcome variable (rather than the number of violent incidents as recorded by “vio”)? [2 points] 2. Estimate a regression of lnvio on shall for 1977: (a) How many observations are in this regression? [1 point] Is this what you expected? [Hint: think about it in relation to the number of states and the number of time periods in this regression] (2 points) (b) What does the coefficient on “shall” imply is the effect of a shall-issue law on violent incidents in 1977 (assuming we believe these estimates)? 3. Estimate a regression of lnvio on shall for 1977, controlling also for incarcrate, density, avginc, pop, pb1064, pw1064, pm1029. (a) How does this…

    • 932 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Assignment 2

    • 851 Words
    • 3 Pages

    6. After the cups were placed either on the floor or on the dashboard, Christopher (who was sitting in the middle in the front seat) was then burned from the cups tipping over when Paul made a left turn. Christopher suffered second degree burns.…

    • 851 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2010). Management of information security (3rd ed.). Boston, MA: Course Technology.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Cjs/250 Appendix G Week 6

    • 353 Words
    • 2 Pages

    Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat.…

    • 353 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    "Challenges And Options For Responding To New And Emerging Risks." GAO Reports (2014): 1. MasterFILE Premier. Web. 13 Feb. 2015.…

    • 1474 Words
    • 4 Pages
    Best Essays