Free

Answer some questions - Assignment Example

Comments (0) Cite this document
Summary
Authentication, access control and auditing work together to establish a defense in layers for a network by ensuring that only authorized users have access to data. This implies that authentication helps in verifying the identity of users through control mechanisms such as…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.1% of users find it useful
Answer some questions
Read TextPreview

Extract of sample "Answer some questions"

Information Technology Authentication, access control and auditing work together to establish a defense in layers for a networkby ensuring that only authorized users have access to data. This implies that authentication helps in verifying the identity of users through control mechanisms such as application of passwords and pin combinations (Ciampa 123).
Similarly, the access control facilitates the defense in network layers by assigning users to various roles in order to grant permissions to access different functions. In this way, the auditing ensures that a system conforms to the security requirements of an individual or an institution. As a result, authentication, access control and auditing work together to establish network defense through the verification procedures, assigning roles to users and installing control mechanisms that curb errors and frauds.
A breach of the CIA triad for a campus police department at a mid-sized private university will allow access of confidential information to third parties. This can lead to loss of data through modification, alteration and disclosure, leading to harmful risks to students and the institution’s database. As a result, hackers can obtain personal information of students and use them for illegal activities like cyber bullying, leaking of examination or tampering with the management information systems.
Another breach is that criminals or hackers can access the police methods of tackling crime and use them to evade arrests. This is because new systems of operations are normally taught in the campus police departments.
The two-factor authentication I would use is the security token since it ensures that every police officer possesses a physical device that shall allow him or her to access the criminal database.
However, the potential problems of this new authentication system are that it can be stolen or lost easily, the system provider can face hacking or the cryptography can be cracked. This implies that the loss of the token can permit an authorized person to access the database. It is also apparent that hacking of the token can affect their security purposes, especially if the provider has not installed tight measures.
OSI model portrays and standardizes the internal operations of a communication system. This occurs through the partitioning of the communication system into concealed details of the functionalities. The OSI model is essential for network security because it simplifies the communication between computers through internet connectivity in a secure manner (Ciampa 125).
Another advantage is that the OSI model enables the sending of numerous bytes at a single time to other devices. It also standardizes interfaces during the communication process in the systems.
The various network investigation tools available online includes L0phcrack, Domain Dossier, John the Ripper and Dictionary attack. L0phcrack is a password recovery system that strengthens window passwords. Domain Dossier is essential for scrutinizing domains and IP addresses in the internet applications.
The Dictionary attack is model that breaks password-secured computer through using dictionary words as passwords.
Digital evidence is legal information transmitted in digital format and be act an evidence in court cases. In this regard, investigators face problems using such materials because they can be fabricated by hackers or software experts.
Another problem is that digital evidence requires encrypted passwords, which should not be lost or tampered with by third parties (Ciampa 205).
Work Cited
Ciampa, Mark D. Security+ Guide to Network Security Fundamentals. Boston, MA: Course
Technology, Cengage Learning, 2012. Print. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Answer some questions Assignment Example | Topics and Well Written Essays - 500 words”, n.d.)
Answer some questions Assignment Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1684755-answer-some-questions
(Answer Some Questions Assignment Example | Topics and Well Written Essays - 500 Words)
Answer Some Questions Assignment Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1684755-answer-some-questions.
“Answer Some Questions Assignment Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1684755-answer-some-questions.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Answer some questions

Some questions to answer in a half page

...environment from a place where he was highly respected. Washington politics made him depressed, but the Clinton’s did not have anything to do with that. Assignment #3:(1/2 page) Tell me your opinion about why USA invaded Iraq?, 5 reasons. I believe the USA invaded Iraq for several reasons. The first was arrogance. Bush made some demands of Hussein which were not met. If Bush would have realized or understood Hussein and his tribal background, he would never have tried to corner Hussein. I believe Bush thought there were weapons of mass destruction (WMD). After realizing quickly there was not any, Bush’s arrogance kept America in Iraq. Fear led the invasion of Iraq. The fear that radical Muslims could attack America again...
3 Pages(750 words)Article

Some questions to answer

...as many ignorant lawmakers as there is today. Granny D had to pay a ten dollar fine and was processed as a criminal. I think the system is being twisted by criminals calling themselves politicians and lawmakers. Assignment #2: Pretend that you hug three old persons without any reason and you told them that you love them. Explain your reaction and then explain their reactions?? It would depend on the three old persons. Some, with Alzheimer’s or feisty personalities, would probably curse or ask if I was crazy. Others would embrace me back and tell me they loved me too. The final group would not have a real reaction, but seemed confused. I would be uncomfortable, because I am not a hug type of person. My discomfort would...
2 Pages(500 words)Article

Microbiology class, answer for each question in 1 page

8 Pages(2000 words)Essay

Answer some research questions

...? Sociological Perspective In this homework assignment I am required to respond to three different essential research questions of sociology. The first question focuses upon the primary job of sociologists and requires us to research whether sociologists should study society with the purpose of changing it or just to provide insight to students and other stakeholders regarding how different societies operate. The second question focuses on the three sociological perspectives, the conflict, symbolic interactionism and functionalist perspectives and asks us which perspective is more applicable in today’s society. The last question focuses on the comparison of both micro and...
3 Pages(750 words)Research Paper

Answer some questions

..., however, they may begin to look at the big picture of society. Perhaps this even will be the wake up that is needed for the individual to take time to reflect on the longevity of life and to seek out ways that they can be more productive members of society. Some of the questions the person might be prone to asking at this stage are: What is my purpose in life? How can I get my life back on track and what steps do I need to take be proactive in doing so? What has got me to this point? In other words, macro sociology requires the person take the event of getting kicked out of college and looking at in the grand scheme of things to determine what place they will ultimately have in society. Chapter 5, Page...
7 Pages(1750 words)Research Paper

Answer some questions to some short stories

...Task: Answers to Short Stories Questions Gilman Perkins condemned the rest cure claiming that it facilitated harmful treatment of women by male physicians. The narrator had a nervous breakdown when she was taken there by her uncaring husband, John (Gilman 23). 2. Gilman blames John, the narrator for the narrator’s madness. First, she makes it clear that all that happened to the narrator, facilitating her illness and distress, originated from her husband’s oppressive behaviors. The idea that he is her doctor and his sister is her nurse is in the first place awkward and shows that he is not serious about his wife’s illness. 3. Yes, John is the villain in the story. She is against the empowerment and...
2 Pages(500 words)Essay

Answer some questions

... Sur Secrets to a Great Marriage I had the good fortune of interviewing my friend’s parents, Paul and Anna who have been together since their college days. They met under funny circumstances. Anna’s best friend, Christine, knew Paul and his best friend but did not know that Paul had a huge crush on Anna. One day, as they passed through the university hall, Christine saw Paul sitting on a table and approached him. Paul was surprised to see that Anna was with Christine and suddenly play-acted to be a gay man so that Anna will feel at ease with him right away after they were introduced. Paul said he found Anna cute and feminine, and when he started talking to her he found out she was smart and funny as well. Anna said she found... Sur Secrets...
2 Pages(500 words)Essay

Just answer some easy guiding questions

... and psychological dissatisfaction in what life has to offer. The reason, why human being focuses more on developing new things is because of this psychological dissatisfaction. Frenkel further states that a lot has changed in terms of the relationship that the human being have with the natural environment. However, there is a little or no time to correct some of the damages that have already been done as a result of this detachment. Question 2 Environmental determinism is defined as the collection of implicit theories that show the relationship between culture and the environment. In most of these theories, the environment has an overall impact on socio-economic developments that occur in day to day life. An example given... Bioregionalism...
2 Pages(500 words)Essay

Answer some questions related to the Criminal Justice in Japan and China

...police departments should be treated with caution since police agencies and local governments act autonomously. Most citizens have suspicion and lack respect on police especially in Japan. Many reports exist of police outright corruption and misbehavior among Chinese police. Moreover, some citizens have outright hostility and contempt towards officers of public security (Qui, 2013). Police training has however improved since Cultural Revolution. Question 4# It was not Chen’s choice but was the state’s for him to work as a cop. He was a man of letters, and that is whom he meant to be. He however still pursues the avocation, while supplementing the income from his police work through poetry and mystery...
4 Pages(1000 words)Assignment

Answer some questions

...History Questions Q The events of the Second World War between the Germany and the opposing sides still continue to dominate the world history. Opposing side plans were included in defeating Britain’s fighters strength, and attacking the British domestic shipping in the English Channel. The battle of Britain was a key battle that took place in the World War II against the Germans who wanted to invade the Great Britain by first conquering the Great Britain’s Royal Air Force. Germany had conjured most parts of Europe inclusive of France and they wanted to proceed and invade the Great Britain to expand their conquest. Germany attacked the Great Britain by bombing and bringing lots of destruction. In return, the British...
6 Pages(1500 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic Answer some questions for FREE!

Contact Us