Entries by Daphne Hanson

The Highest Prioritized Risks for a Bank

What are the Highest Prioritized Risks for a Bank(Chase), please list 4, and answer each question. Your position will be a CISO. Potentially Impacted Asset(s) Threat or Threat Actors Vulnerability(ies) Impact if Realized Duration of active risk Please don’t copy answers

Why is Cyberterrorism difficult to define?

Why is Cyberterrorism difficult to define? Many cybersecurity professionals believe the likely application of “cyber terrorism” to be an asymmetric attack against some portion of this nation’s critical infrastructure. Which critical infrastructure do you think to be a likely target and why? Who should be responsible for protecting that infrastructure, and why? Would this vary […]

Information security practices

What is the standard of good practice or “the gold standard” of information security practices? How do organizations measure the effectiveness of best practice information security practices and IT Risk Management measures?

Level of security risk

What level of security risk do you estimate for the following threat-asset matrix entries for the ACME Software Company Question 1 C, PD – Confidentiality of Product Development. This includes disclosing information, tools, systems and data related to product development such as source code, documentation, and tool information to unauthorized individuals or groups. High Medium Low

Microsoft SQL server

 MICROSOFT SQL SERVER: Identify the edition. provide a rationale for identifying the server component best for the following business scenarios. (A) Questionable meds pharmaceuticals have been collecting sales data for five years. Sales tremendously increase over the last two years. Jason is asked to look for trends to explain the increase. (B) Jason of questionable med […]

Cryptography and computer security

In cryptography and computer security, a man-in-the-middle attack (MITM), is an attack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other. (i) Describe how a man-in-the-middle attack may be performed on a Wi-Fi network and the consequences of such an attack. […]

Security information and event management

How to implement a security information and event management (SIEM) solution? What is one methodology for applying security controls to ICSs and SCADA systems? How to implement a SIEM solution for a Water Distribution Facility SCADA system? Please provide three references to help with summarizing the process and the supporting the explanation.

Data Encryption Standard

Data Encryption Standard (DES) Part A: 4.1 Briefly define a nonsingular transformation. 4.2 What is the difference between a block cipher and a stream cipher? 4.3 Why is it not practical to use an arbitrary reversible substitution cipher of the kind shown in Table 4.1? 4.4 Briefly define the terms substitution and permutation. 4.5 What […]

Formal risk assessment of the external server

As part of a formal risk assessment of the external server in a small Web design company, you have identified the asset "integrity of the organization’s Web server" and the threat "hacking and defacement of the Web server." Assume that their website uses common CGI programs, such as guestbook or blog software, which we know […]

The issue of cyber safety

We continue this week looking at the issues associated with safety and delve further into the issue of cyber safety. As teachers, we have a responsibility to ensure our students are equipped with the skills and awareness of safe practices online. Additionally, you will also be exploring a great online tool, Canva, which hopefully you […]