StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Week 4 discussion - Assignment Example

Cite this document
Summary
Competitions can be organized periodically within or between universities under monitored conditions on issues such as security. The main…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.8% of users find it useful
Week 4 discussion
Read Text Preview

Extract of sample "Week 4 discussion"

Running Head: Designing Cyber Competitions. Department Question Cyber exercises provide a useful learning experience to students studying computer sciences especially at college and university levels. Competitions can be organized periodically within or between universities under monitored conditions on issues such as security. The main objective is for students to acquire hands on and experiential skills on information security. The design of these competitions is a complex task requiring the input of different minds as well as consideration of a number of pertinent issues.

It is therefore very important that we understand the issue to consider when designing the exercises. One important issue of consideration is the structure and approach of the competition. There is need for adoption of a uniform structure throughout the exercise as this presents participants with a level playing ground. Any exercise must have certain objectives to be met and as such defining objectives is important in designing cyber competitions. The kinds of equipment to be used in terms of hardware and software as well as approach to be taken are important issues in cyber exercises.

These are heavily dependent on the objectives set for the competition. it is very important to decide the overall topology over which the competition is run keeping in mind the available/chosen equipment for the exercise. The next consideration after deciding on the topology is to formulate the exercise scenario, come up with rules to govern the competition and also define the metrics for evaluating the competition’s efficiency basing on the set objectives. There should also be a methodology with which to gather lessons learned from the simulation by both the participants and organizers.

a very important consideration is defining the entities to make up the competition; generally, competitions on cyber security have two sides i.e. the attacking site & the defense side. Every side has systems which are managed by participating teams and each side should have at least a system to facilitate participation in the competition. Question 2 In order to protect any web application from vulnerabilities and threats of attack, a comprehensive understanding of every communication by the application is required.

This is because the security solution/device must be able to see data in the same way as the application to be protected in so as to map out areas of threat. in other words, security devices must be in the position of performing complete deconstruction of HTML data play sessions and monitor all applications sessions in order to secure the application. It is my opinion that deploying firewalls is the best way to protect web applications of critical importance. Firewalls for protecting web applications operate at the level of application layer as opposed to many other security solutions which operate at the level of network.

They are therefore able to terminate all the sessions of the application and carry out a complete bi-directional audit on all the applications data. Through inspection of actual HTML communication, reading all user requests in the application as well as responses by the application as well as the contexts in which they reach the Web servers, application firewalls are able to enforce appropriate behavior of the application and deter any malicious action. One very common for carrying out scripting attacks is by injecting malicious scripts through HTML form fields.

Implementation of application firewalls is the only security solution able to detect, prevent and even defeat such malicious actions on crucial web applications. References.1. Victor-Valeriu Patriciu and Adrian Constantin Furtuna. (2008). Guide for Designing Cyber Security Exercises.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Week 4 discussion Assignment Example | Topics and Well Written Essays - 500 words - 1”, n.d.)
Week 4 discussion Assignment Example | Topics and Well Written Essays - 500 words - 1. Retrieved from https://studentshare.org/information-technology/1655819-week-4-discussion
(Week 4 Discussion Assignment Example | Topics and Well Written Essays - 500 Words - 1)
Week 4 Discussion Assignment Example | Topics and Well Written Essays - 500 Words - 1. https://studentshare.org/information-technology/1655819-week-4-discussion.
“Week 4 Discussion Assignment Example | Topics and Well Written Essays - 500 Words - 1”, n.d. https://studentshare.org/information-technology/1655819-week-4-discussion.
  • Cited: 0 times

CHECK THESE SAMPLES OF Week 4 discussion

Week 4 Discussion-Epi

Kampala Henry Wasswa, week 4- Cluster or Outbreak Order No.... The Medical fraternity is facing the problem of dealing with the increase in the number of tuberculosis and West Nile Virus cases and doctors and other health officials are looking towards health care which is community based because it is one of the most cost – effective… There are several causes for the prevalence of tuberculosis such as the presence of ‘AIDS, poor medical infrastructure, poor sanitation in certain areas and a lack of awareness of the dangers leading to the disease....
2 Pages (500 words) Essay

Week 4 class discussions

Please remember that you are no editing their post answer, you are just writing what you think… It will be just like a sit in class discussion with you the teacher and the other students.... With this system, you look at what point revenues and Please respond to (6) other discussion posts.... It will be just like a sit in class discussion with you the teacher and the other students.... tudent discussion # 1PaulI wanted to talk about breakeven analysis....
2 Pages (500 words) Essay

WEEK 4 DISCUSSION PART 1

The study will Week 4 discussion Part Medicaid fraud is an overwhelming problem that has affected the US healthcare system.... The phenomenon has resulted in loss of billions of dollars from the public healthcare kitty.... Due to the impacts of Medicaid fraud, concerned parties are exploring possible remedies to contain… In addition, authorities are interested in establishing the magnitude of the fraud and the factors that promote fraud....
2 Pages (500 words) Essay

Week 4 Discussion 2 (Chapter 6) Inventories

This method will help the Week 4 discussion 2 (Chapter 6) "Inventories" of the of Week 4 discussion 2 (Chapter 6) "Inventories" Answer Although there is no best model for accounting the inventory related costs as the decision for selecting the accounting method depends upon the management's discretion to either report high income to show profitability or less income to escape income taxes....
1 Pages (250 words) Assignment

Week 4 Discussion - INTL 5645

China's economy has risen dramatically for the last two years.... This has been propelled by increasing urbanization and decline of… China has been accused of stifling the creativity of its professionals.... China's economic growth has been unprecedented (Hu, 89).... The country has grown at an average of 9....
2 Pages (500 words) Assignment

The Importance Of Time Travel In The Future

Spearheading the time travel debate, Carl Sagan indicates that there is a possibility that people can travel through time, Week 4 discussion 2 Main Post Life is laden with numerous mysterious aspects, most of which, we can barely comprehend.... In the week's select readings, these issues include the query of time travel, potential impact… f rapidly growing technology on the future, and the question of whether there can be a perfect world, devoid of the chaos that characterize our society....
2 Pages (500 words) Essay

Week 4 Discussion Post

The film explores how gender can be a serious issue to a person's identity.... Society is full of problems that can cause people to be angry at each other.... However, someone does not need… There a way a proper way of solving issues by just accepting who we are and remain true to ourselves, that way one is freer to think properly and rationally to solve a problem and live in peace (Mitchell 10). The Visual arts Film: The Advocate Year: 2001 The advocate is a very interesting film exploring the facts of homosexuality in the society....
1 Pages (250 words) Assignment

ECE440 Week4Discussion

It provides a new way of examining the society based on the planning required to ascertain the impact that data has in determining a program's quality and the role of the… The important step is to carry out comprehensive assessments that allow for multiple outcomes based on the information collected as well as the work on measures that will ECE440 Week 4 discussion Module ECE440 Week 4 discussion Assessment is a tool that allows educators to work on the impact of their instructions on the students....
1 Pages (250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us