Free

CIS212 U1 Discussion - Essay Example

Comments (0) Cite this document
Summary
It is inclusive of how the security controls are. It has to be in a manner that advances the security and integrity of the data in the…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.8% of users find it useful
CIS212 U1 Discussion
Read TextPreview

Extract of sample "CIS212 U1 Discussion"

Security Management Process Insert Insert Security management entails ensuring that the integrity, confidence and consistency in theavailability of services and data in an organization. It is inclusive of how the security controls are. It has to be in a manner that advances the security and integrity of the data in the organization. It also ensures that users are not services that should be available at all times. Testing will ensure a smooth operation and prevent attacks that take advantage of obsolete concepts. Further, management of intrusions is crucial (Poulsen & LaPage, 2011). The mission is to identify and counter attacks. These should level to a situation that is accommodating to the organization at least. The preceding is with reviewing of the security mechanisms to ascertain and ensure that frequent testing is done on them and maintained as well.
There are various common means of authentication. The notion is to get the victim known to be what they allude to be. Essentially there is user authentication and entity authentication. As a result, we have form authentication that entails passing in a username and password on web pages to gain access. Cookies are authentication mechanisms as a means to achieve entity authentication. It accomplishes this through the use of sessions. Authentication at the infrastructure will involve the use of DNS names. They are applicable where applications need to allow access to other hosts. In addition, there is spoofing of IP addresses. To make it more viable, integrate with the use of SSL. Using authentication mechanisms that use usernames and passwords is all time favorite. Despite the method being familiar and readily available, it is also weak and easier to penetrate (Ciampa, 2012). Due to its user-friendliness, if precautions are into account like the inclusion of symbols and letters within the text then it is the cheapest.
A number of issues psyche hackers. First is the fun and satisfaction they attain by hacking. Secondly, they do so to gain some finances. By getting information to third parties, they are paid highly for their services thus it is a means of livelihood to some. They use means like phishing, brute-force attack, dictionary attack, and SQL injection for site hacking. Further cross-site scripting is also applicable. They accomplish this through establishing a plan of execution. Foot printing deals with comprehension of the system they wish to hack just the way a physical gang will prepare to attack a bank.
References
Ciampa, M. (2012). Security+ guide to network security fundamentals. Boston, MA: Course Technology, Cengage Learning.
Poulsen, T., & LaPage, A. (2011). CompTIA security+ certification. [Fairport, NY]: Axzo Press. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“CIS212 U1 Discussion Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
CIS212 U1 Discussion Essay Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1687615-cis212-u1-discussion
(CIS212 U1 Discussion Essay Example | Topics and Well Written Essays - 250 Words)
CIS212 U1 Discussion Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1687615-cis212-u1-discussion.
“CIS212 U1 Discussion Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1687615-cis212-u1-discussion.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF CIS212 U1 Discussion

Northrop Grumman U1

...UNIT BUSINESS APPLICATION ASSIGNMENT goes here] [Your goes here] [Due the paper] Northrop Grumman Corporation Introduction The name of the company that we have selected for review is Northrop Grumman Corporation. Northrop Grumman is an American company that offers defense technologies and cyber security systems to meet the demands of emerging security challenges of the world. “Cyberattacks have become a big concern for companies, and the US and foreign governments” (Maurer, 2012). Northrop Grumman deals with cyber attacks, as well as with four other business sectors that include aerospace systems, electronic systems, information systems, and technical services. I was interested in knowing different defense systems and technologies...
2 Pages(500 words)Essay

MGMT444 U1 IP

...Running Head: MGMT444 U1 IP MGMT444 U1 IP Teacher’s ID Since it is a senior level position, the candi is expected to have an ability of taking initiatives and taking charge of projects and day-to-day tasks. Please tell us how you were performing these tasks in your current job. Also what kind of projects and ideas you have introduced yourself during your career. This question is expected to indicate if the candidate is creative enough to introduce new ideas and take control of situations like a business leader. 2) We need someone who has 360 degree vision of everything going around them as leaving out necessary information means losing productivity and foresight for potential opportunities. Please tell us...
2 Pages(500 words)Research Paper

MGMT442 U1 IP

...Running Head: MGMT442 U1 IP MGMT442 U1 IP Teacher’s ID Q1. During your career, what are your most successful initiatives? Something that you are proud of or can quote as your achievement? The candidate should have experience of setting up a new service department in similar industry. If not, he should exhibit that he has entrepreneurial qualities and can take initiatives. Q2. While taking such initiatives, did you ever-encountered resistance (related to both material and human) and how did you managed it? This question should elaborate the interpersonal skills along with controlling and management skills of the candidate. Q3. Can you give some examples of your achievements as a team player or while...
2 Pages(500 words)Research Paper

MGMT458 U1 IP AVON

...AVON Mission ment Question Avon’s vision and mission is “To be the company that understands and satisfies the products, services and self-fulfillment needs of women-globally” (Avon, 2014). They represent empowering women by offering job opportunities; fighting breast cancer and domestic violence. To achieve a healthy balance between employees’ personal and work life, Avon offers benefits such as service rewards, health care, employee assistant programs, child care vouchers, annual leave entitlement, and flexible work hours to name a few (Avon, 2014). "Avons mission is centered on six-center yearnings the organization consistently strives to attain," starts Avons Mission statement. At that point, it goes on. It weighs in at 249... Mission...
2 Pages(500 words)Research Paper

U1 Discussion

...Cause of IP Address Conflict and its Resolution s Cause of IP Address Conflict and its Resolution As a network administrator, I am tasked with maintaining the computer software and hardware systems which make up the computer network, such as, monitoring and maintaining of either converged infrastructure or active data network, monitoring network traffic, testing the network for weakness, and installing and implementing security programs (Bautts, Dawson, & Purdy, 2010). The Dynamic Host Configuration Protocol (DHCP) is a network protocol which enables the server to assign automatically an IP address to a computer from a definite scope configured from a certain network. The DCHP allows the network administrator to supervise... of IP Address...
1 Pages(250 words)Coursework

CIS 206 U1 Discussion

...Fedora Comparison to other Linux Distributions School Linux operating system has many distributions that come up with several operating systems. The major operating systems and distributions are Debian, Ubuntu, Arch, and Red hat. Debian distribution produces operating systems like Ubuntu while Red-hat produces fedora and arch produce the Arch Linux. Other notable Linux distributions include OpenSuse, CentOS, Mint, Mandriva and Kali Linux formerly backtrack. In the text, we will focus on Fedora, Ubuntu and Arch Linux. Fedora started in 2002 as a spun off from an undergraduate project called Fedora Linux and is supported by the open-source community. Ubuntu is a fork of Debian, that is on of the oldest Linux distributions available...
1 Pages(250 words)Essay

CIS 206 U1 Review Assigment

...Computer Sciences and Information Technology Reasons why Linux is Popular Linux is popular because it has unique, as well as powerful features. It can work as a control program for computers. In addition, it is a well-orchestrated family of utility programs and a set of tools, which allow users to connect and use its utilities to build systems and applications (Sobell, 2012). Linux is popular in academia as students can easily understand it. It supports several codes and a rich software development environment. The development of Linux from the time it was UNIX took the effort of universities took the efforts of university and college students to publicize it. Linux also offers more flexible and configuration options... Sciences and...
1 Pages(250 words)Coursework

CIS212 U1 Review

...Nuclear Plant Password Policy Insert Insert Activity 1 As an information officer, what are the information security goals that you need to keep in mind while defining the protection you shall need?(Select all that apply.) The goals are detection, prevention, and recovery 2) What are applicable forms of vulnerabilities? (select all that apply) They include improperly configured software, misuse of communication protocols and damage to Hardware 3) Detail the difference between a threat, vulnerability, and a risk. A threat is anything that poses the danger to the computer system whereas vulnerability refers to a loophole or a weakness that hackers or attackers can use to attack a system. Atheotherhandlikelihoodloss... Plant Password Policy...
1 Pages(250 words)Essay

CIS212 U3 Discussion

...How Users Access and Logon to Systems Access control tools are concerned with determining the allowed activities of legitimate users, mediating between every attempt by a user to access a particular resource in the system. Its main objective is to make sure that undesired users do not get access to certain information; only those who are allowed can access. Role-based access control and Discretionary Access Control both are based on defining the roles and adding each user to the system. Authorization and privileges are granted. The main difference between these two user control assets is that RBAC has ease of management while DAC is complicated since each new user has to go through all the details the user needs access to and add... Users...
1 Pages(250 words)Essay

CIS126 U1 Discussion 2 - 1

...The Dark Side of Object Technology Insert Insert Object technology became prevalent in industrial languages as from 80’s but became established in other languages like Java and UML in the 90s. The evolving nature of Object Technology has caused many companies to reexamine their legacy codes to ensure that it matches it. The progress and acceptability of Object Technology have been growing significantly in the market. In the recent years, some languages like C++ and Java have considerably advanced in the use of Object Technology. Despite the many benefits that object technology poses, its weaknesses include them being complex legacies that scare its owners. The latter has made timely delivery a complicated process. TDD... Dark Side of Object...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic CIS212 U1 Discussion for FREE!

Contact Us