Study the scenario and complete the question(s) that follow: With computer systems increasingly under attack, informatio

Business, Finance, Economics, Accounting, Operations Management, Computer Science, Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Algebra, Precalculus, Statistics and Probabilty, Advanced Math, Physics, Chemistry, Biology, Nursing, Psychology, Certifications, Tests, Prep, and more.
Post Reply
answerhappygod
Site Admin
Posts: 899603
Joined: Mon Aug 02, 2021 8:13 am

Study the scenario and complete the question(s) that follow: With computer systems increasingly under attack, informatio

Post by answerhappygod »

Study The Scenario And Complete The Question S That Follow With Computer Systems Increasingly Under Attack Informatio 1
Study The Scenario And Complete The Question S That Follow With Computer Systems Increasingly Under Attack Informatio 1 (51.07 KiB) Viewed 43 times
Study The Scenario And Complete The Question S That Follow With Computer Systems Increasingly Under Attack Informatio 2
Study The Scenario And Complete The Question S That Follow With Computer Systems Increasingly Under Attack Informatio 2 (55.26 KiB) Viewed 43 times
Study The Scenario And Complete The Question S That Follow With Computer Systems Increasingly Under Attack Informatio 3
Study The Scenario And Complete The Question S That Follow With Computer Systems Increasingly Under Attack Informatio 3 (19.37 KiB) Viewed 43 times
Study the scenario and complete the question(s) that follow: With computer systems increasingly under attack, information security is more serious in user views. Security protects computer and everything associated with it including networks, terminals, printers, cabling, disks and most important, it protects the available information in this environment. Driving the growth, and at the same time being driven by it, the explosion in computer networks is expanding the impact of the social web. The way that content is shared and accessed, is now the core of a new global culture, affecting and combining the spheres of personal and business life. The purpose is to protect against intruders who break into systems to catch sensitive data, steal passwords, or whatever misuse; they can do it. Confidentiality, integrity and availability are three distinct aspects in the security domain. Protection of information is ensured by confidentiality. Avoiding from corruption the information and permission to unauthorized access or malicious activity is achieved
by integrity. Availability assures efficiency of working and ability for recovery in disaster situations. The security of the overall system is restricted by the safety of its weakest link. Any single weakness can affect the security of the system entirely. The threats include web site defacement, network penetrations cause corruption and loss of data, denial of service attacks, viruses, Trojans and endless series of new stories proves that the threats are real. In fact, network security involves with three realities: first, the defender must defend against every possible attack, while the attacker only needs to find out one weakness. Second, the immense complexity of modern networks forms them impossible to secure properly. Third, professional attackers may encapsulate their attacks in programs, allowing ordinary people to use them. According to studies vulnerability assessments and intrusion prevention or intrusion detection are just one aspect of IT security management. However, due to recent developments with the continuing spread of network connectivity IT security management, is faced with yet another challenge, requiring a structured approach for an adequate response.
5.1 a. What technology do you think organisations should implement to help identify and thwart b. C. these threats? How does the technology you stated above really work? From the scenario and using your opinion. Motivate why is it important to use the technology you stated in 5.1? (2 marks) (8 marks) (15 marks)
Join a community of subject matter experts. Register for FREE to view solutions, replies, and use search function. Request answer by replying!
Post Reply