StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Discussions questions - Assignment Example

Cite this document
Summary
They also interact with their customers over social networks. The fact that most of their information is available online, hackers find it easy to access them over the internet
Hackers…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.8% of users find it useful
Discussions questions
Read Text Preview

Extract of sample "Discussions questions"

Discussion Questions on Network Security Week 2 Discussion Top of Form A. Explain why you believe the trend of threats targeting large enterprises is risingLarge enterprises carry their activities online in order to serve their customers better. They also interact with their customers over social networks. The fact that most of their information is available online, hackers find it easy to access them over the internetHackers especially those with aim of making money will have much more to gain by hacking large enterprises as compared to small companies.

This is because larges enterprises transact millions of dollars daily hence hackers will have much more to gain from their effort than just hacking smaller companiesLarge enterprises have many employees spread of a lager geographical cover i.e. worldwide who could be difficult to control. These employees could be compromised by hacker so as to provide details to help them hack in the systems. Research shows that most large enterprises hackings are always done from the inside. B. What do you believe is the greatest tool these hackers have at their disposal?

Provide a rationale.The greatest tool that these hackers have at their disposal is Google. Using Google smart search a hacker can get any information they want about any individual including family names, credit card information, date of birth, home address, medical records, classified government records etc. Once hackers have access to this kind of information, it is easier for them to carry out any attack ranging from theft, fraud or gain access to restricted resources. Google can also provide information about organizations’ profile of web servers, unprotected directories, financial information and database information.

This is the kind of information hackers use to attack there target. Hence Google smart search has become the greatest tool used by hackers. C. Select and detail one other recent trend in cybercrime and explicate the challenge(s) that this trend creates for system forensics investigators.One recent cyber-crime that is on the rise is cloud crime. Cloud computing is trending in IT and most companies are moving to cloud services. Therefore with more companies putting information on public cloud services, cloud services have become targets.

However system forensics investigators face several challenges in trying to solve the crime. For instance, form the legal dimension, there are no agreements among cloud organizations to enable collaborative investigation. Also majority of SLAs between these companies have no terms and conditions regarding the separation of responsibilities between the cloud service provider and the customerWeek 2 Discussion 2 A. The greatest challenge for system forensic investigators with rationaleThe greatest challenges facing system forensics investigators is how to retrieve and handle data form mobile handheld devices.

Revolution in technology has seen emergence of mobile handheld devices like smartphones like Apple iPhone and blackberry, iPads, tablets, Personal Digital Assistants (PDAs) and audio players such as iPods and mp3 players. These gadgets are used by most people in day to day activities from the office work to social networking. Unfortunately, criminals too have not missed this technological evolution. They are using these gadgets to commit crimes and system forensics investigators have struggled to manage data evidence from these devices because they have specialized interface, storage media, hardware and also file systems that operate from a volatile memory.

These coupled with short product cycles makes it difficult for systems forensic investigators to remain relevant with new technologies. However in case of a private investigation company, this may not be a problem because they are normally proactive in investing in latest technologies as compared to government law enforcement investigation. B. From the 11th Circuit ruling that forced decryption of an encrypted volume as unconstitutional, take a position and decide whether or not the subject matter of the potential evidence contained therein should have an effect on the court’s decision.

The court was right in ruling that the decryption of the hard drive was unconstitutional. Forcing a criminal to decrypt that hard dive that may provide evidence for his prosecution will amount to forcing a testimony. In any legal system, any witnesses are entitled to give evidence without being forced. Therefore even if the criminal will be forced to decrypt the hard drive, the information should not be used in his prosecution. The information can only be used against him if the hard drive is decrypted by somebody else.

Week 2 Discussion 3Discuss why written security policies are necessary in both small and large organizations Therefore a network security policy will refer to a blueprint that grants a user the privilege to utilize a system and also monitors who enters the system and their purpose for using the system.A security policy defines what protocols to be followed in performing specific tasks in systems. These therefore will help in identifying any threats and attacks in a network. It also helps regulate and provide proper access mechanism to system to users especially on large networks.

It also helps to understand the appropriate use and permissions granted to groups and users of the system and prescribed remedies for misuse. Also problems encountered by any system occur very fast and needs to be solved immediately to avoid denial of service. A policy will enables system administrators managing the system to understand the system better and solve any problem arising as soon as possible.ReferencesCantech Letter (2013). Nortel Syndrome: Why Large Companies will continue to be hacked.

Retrieved from < http://www.cantechletter.com/2013/02/nortel-syndrome-why-large-companies-will-continue-to-be-hacked0221/> Forbes (2013). The Biggest Cyber security Threats of 2013. Retrieved from < http://www.forbes.com/sites/ciocentral/2012/12/05/the-biggest-cybersecurity-threats-of-2013-2/> Wired Crimes Report (2012). Forcing Defendant to Decrypt Hard Drive Is Unconstitutional, Appeals Court Rules. Retrieved from < http://www.wired.com/threatlevel/2012/02/laptop-decryption-unconstitutional/> A.

Top of FormBottom of Form

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Discussions questions Assignment Example | Topics and Well Written Essays - 500 words”, n.d.)
Discussions questions Assignment Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1620995-discussions-questions
(Discussions Questions Assignment Example | Topics and Well Written Essays - 500 Words)
Discussions Questions Assignment Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1620995-discussions-questions.
“Discussions Questions Assignment Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1620995-discussions-questions.
  • Cited: 0 times

CHECK THESE SAMPLES OF Discussions questions

Discussion Questions

Discussion questions Name Instructor Date Discussion questions Language Our department, which falls under the marketing division of the corporation, keeps close tracks of the changes in the market structure of the company, as well as that of its products.... A company is only as good as it is able to control its market sphere (Gomez-Mejia, David, & Robert, 2008, p....
5 Pages (1250 words) Essay

Search methods & techniques: Google vs library resources

I avoid borrowing book sources from the library whenever possible, because carrying the required textbook is already a tremendous burden.... Moreover, I have access to the… It contains more books than the University Library.... I always use it whenever I write papers requiring published books....
2 Pages (500 words) Essay

Discussion Questions

(1994 – 2006) Considering all the above elements, it is but evident that mufflers Discussion questions Order No.... Noise is also a kind of pollution and it has been scientifically proved through consistent research that noise shortens life.... Noise can be defined as any sound that is too loud and… Statistics show that fatal crashes for motor cycles “are higher at 75....
2 Pages (500 words) Essay

Discussion Board Questions

In this 9th November Discussion questions Question One of the major challenges faced by individuals who are looking for jobs is to get the job that is compatible with their skills.... Before taking a job based on the salary, it is imperative for a college student to consider the development opportunities that exist in the company....
2 Pages (500 words) Essay

Discussion question

To discussion the question, ‘Capitalism: the Unknown Ideal' by Ayn Rand and ‘Capitalism and Freedom' by Milton Friedman are essential references. Today the most powerful ways… Body piercing has become the self-expression, reclamation or enhancement tactic in current society.... In most societies, the habit of body piercing is all over, mainly among young citizens, who are getting Discussion question Introduction This is a discussion paper analyzing capitalism as one of the key topics in this To discussion the question, ‘Capitalism: the Unknown Ideal' by Ayn Rand and ‘Capitalism and Freedom' by Milton Friedman are essential references....
1 Pages (250 words) Coursework

Discussion Questions

Theory X is a style of management that assumes employees dislike their work; they avoid responsibility and needs direction, have to be controlled or threatened, need to be supervised and need to be enticed to produce work.... They are vertical in hierarchy.... Theory Y refers to… ipative style of management, and employees are considered motivated and willing to take responsibility for their work, seek and accept the work and require little direction and most important consider work as a natural part of their lives....
2 Pages (500 words) Essay

Discussion Questions

One of the ways that such an individual would have a different career path from myself is the background from which the individual was raised.... Hailing from the Chicago Projects, his economic… As such, such an individual is likely to avoid formal white collar employment as his parents would not afford to take him to college....
2 Pages (500 words) Coursework

Chinese and Western Music Culture

The author of this paper "Chinese and Western Music Culture" examines the matter of listening to the beautiful Chinese and American music, examples of Shizhane'e' in Western Popular music, the rhythm of the Sanjuan tradition compared to Chinese Jiangnan Sidhu, particular musical style elements.... hellip; This way, the natural is culturalist while the culture is neutralized....
10 Pages (2500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us