country
$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

ENGR8762 Computer Networks And Cybersecurity Assessment

tag 0 Download4 Pages / 904 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT
  • Course Code: ENGR8762
  • University: Flinders University
  • Country: Australia

Question:

For the following Threat Categories, describe which type of Control should be put in place in an organisation. Classify the controls as Administrative, Product or Physical, as well as whether the controls will Prevent, Detect, Correct or Compensate.

 

Answer:

Threat Category

Control

Description

Classification

Type

Accidental corruption of information

Network monitoring

Network traffic is monitored to identify and investigate fraud data transfers

Administrative

Prevent and detect

Export control

Unauthorized access of sensitive data is restricted by controlling ability to paste, copy and print parts of documents.

Physical and Administrative

Prevent

Control of physical media

Copy of sensitive data to unauthorized devices is prevented.

Physical

Prevent

Perimeter security

Sensitive data is prevented from leaving the perimeter

Physical

Prevent

Loss of intellectual property

Security of proprietary information

Access to proprietary information is controlled

Administrative

Prevent

Data security and encryption

Data is encrypted by process of cryptography such that unapproved access is prevented

Physical

Prevent and detect

Secure servers

The servers should be secured by using antivirus and firewalls.

Product

Prevent and detect

Remind people of access to sensitive IP

People is reminded continuously to protect sensitive IP.

Administrative

Prevent

Software piracy

Firewall

Source IP address is filtered for access to software that prevents software privacy

Product

Prevent

Antivirus

Ensures that system does not contain any malware that will facilitate software piracy

Product

Prevent

Policy to update antivirus

Software should be updated to prevent software piracy

Administrative

Prevent

Web application firewall

Identifies any piracy in software

Product

Prevent and detect

Plan to respond to incidents

Plan that will prepare to respond to software piracy quickly

Administrative

Compensate

Theft of information (hacker)

Firewall

Controls traffic passing through all network ports

Product

Prevent

Anti-malware software

Detects malwares in the network used by hackers to steal data

Product

Prevent and detect

Sensitive data encryption

Sensitive data stored in storage device should be encrypted so that it becomes hard to access even if hacker gains access to network.

Administrative

Prevent and detect

Policy to keep software updated

Processes and procedures are ensured that they are in place by keeping all software updated

Administrative

Prevent and detect

Theft of information (employee)

Standard and Limited user account

Administrative login Id and password should be given to trusted employees

Administrative

Prevent

Overwrite storage devices before discarding

Hard drives, memory cards, USB flash drives and other storage devices that stored previous personal information should be should be either destroyed physically or overwritten before discarding them.

Physical

Prevent

Using secured connection to send sensitive data

SSL/TLS protocol ensures that sensitive data is send securely such that theft of information by employees is not possible

Physical and product

Prevent and detect

Website defacement

Sucuri tool

Website monitoring tool that protects, provides backup and quality performance

Product

Prevent and detect

IPVTec tool

Online monitoring tool that detects website defacement

Product

Detect

Visualping

Website area that wants to be monitored can be done by the use of visual ping.

Product

Detect and prevent

WebOrion tool

Monitoring service that offers content, visual change and integrity monitoring

Product

Prevent and detect

Wachete tool

Monitors entire website or a particular area every 24 hours

Product

Prevent

Theft of equipment

Providing theft indicator to each equipment

This will give an alarm when equipment is stolen.

Physical

Detect

Keeping record of all equipment

Recording details of each equipment will help to identify equipment that are wiped and swapped.

Physical

Detect and prevent

Using spy cams

Advancement of technology has led to the discovery of spy cameras that helps in detecting equipment theft.

Product

Prevent and detect

Viruses, worms, Trojan horses

Antiviruses

Detects malwares that will prevent from any virus being installed in system

Product

Prevent

Web application Firewall

Detects application layer attacks and also helps in mitigating them

Product

Prevent and detect

Detection and prevention systems of intrusions

Uses signature database for identifying threats that alerts a system administrator of any malware

Product

Detect

Firewall

Filters IP addresses that are accessing the network that prevents attacks of viruses, Trojan horses and worms

Product

Prevent

Elevation of privilege

Decrypter

The encrypted exploit code should decrypted by the decrypter.

Product

Prevent and detect

API resolver

Determines the working of shell code and position-independent codes

Product

Prevent and detect

Environment checker

Identifies the platform of operating systems and version number.

Product

Prevent and detect

EoP exploit DLL

After environmental checking is done, exploit routine is done to prevent memory corruption and privileged code execution

Product

Prevent and detect

Fire/ Flood

Locating organization in safe place

The organization should be located in a safe place where floods do not occur to prevent from floods

Administrative and physical

Prevent

Using flood resistant and fire resistant techniques

Fire and flood resistant techniques should be used to prevent from fire and flood

Administrative and physical

Compensate and prevent

 

 

References:

Abomhara, M. and Køien, G.M., 2015. Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. Journal of Cyber Security, 4(1), pp.65-88.

Beberlein, L.T., Dias, G., Levitt, K.N., Mukherjee, B. and Wood, J., 2017. Network attacks and an Ethernet-based network security monitor.

Jouini, M., Rabai, L.B.A. and Aissa, A.B., 2014. Classification of security threats in information systems. Procedia Computer Science, 32, pp.489-496.

Rathore, S., Sharma, P.K., Loia, V., Jeong, Y.S. and Park, J.H., 2017. Social network security: Issues, challenges, threats, and solutions. Information Sciences, 421, pp.43-69.

Shu, Z., Wan, J., Li, D., Lin, J., Vasilakos, A.V. and Imran, M., 2016. Security in software-defined networking: Threats and countermeasures. Mobile Networks and Applications, 21(5), pp.764-776.

White, G.B., Fisch, E.A. and Pooch, U.W., 2017. Computer system and network security. CRC press.

Download Sample

Get 100% money back after download, simply upload your unique content* of similar no. of pages or more. We verify your content and once successfully verified 100% value credited to your wallet within 7 days.

Upload Unique Document

Document Under Evaluation

Get Credits into Your Wallet

*The content must not be available online or in our existing Database to qualify as unique.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2020). Computer Networks And Cybersecurity Assessment. Retrieved from https://myassignmenthelp.com/free-samples/engr8762-computer-networks-and-cybersecurity-assessment.

"Computer Networks And Cybersecurity Assessment." My Assignment Help, 2020, https://myassignmenthelp.com/free-samples/engr8762-computer-networks-and-cybersecurity-assessment.

My Assignment Help (2020) Computer Networks And Cybersecurity Assessment [Online]. Available from: https://myassignmenthelp.com/free-samples/engr8762-computer-networks-and-cybersecurity-assessment
[Accessed 11 August 2020].

My Assignment Help. 'Computer Networks And Cybersecurity Assessment' (My Assignment Help, 2020) <https://myassignmenthelp.com/free-samples/engr8762-computer-networks-and-cybersecurity-assessment> accessed 11 August 2020.

My Assignment Help. Computer Networks And Cybersecurity Assessment [Internet]. My Assignment Help. 2020 [cited 11 August 2020]. Available from: https://myassignmenthelp.com/free-samples/engr8762-computer-networks-and-cybersecurity-assessment.


Wondering how to write a flawless research paper? If you’re having confusion over the research paper then the services are MyAssignmenthelp.com will guide you. Our experts will follow all the steps crucial to the process of research paper writing. Be it preparing the research paper outline, or developing the main arguments, our writers will do everything from scratch. These experts are also aware of how to appropriately start or conclude a research paper. This way, our experts bring out the best of every research paper topics they work on.

Latest It Write Up Samples

C727 Cybersecurity Management I

Download : 0 | Pages : 12
  • Course Code: C727
  • University: Western Governors University
  • Country: United States

Answer: Introduction The below report attempts to explain how threats and vulnerabilities can critically affect the regular operations of any organization (Papp, Ma and Buttyan 2015). This report tries to review the report made by Autojor Security Consultants on the medical supplier business Psinuvia Inc. and provides responses that are demanded from the respective fields. The report begins by discussing the physical vulnerabilities and threa...

Read More arrow Tags: United States 7 CYBERSECURITY MANAGEMENT I  Western Governors University 

IT243 System Analysis And Design

Download : 0 | Pages : 3
  • Course Code: IT243
  • University: Saudi Electronic University
  • Country: Saudi Arabia

Answer: Part 1: Planning Phase Project Identification The project is prepared for the development of a sailboat reservation system for a company named Yachts Australia. The company operates charter yacht fleet in Great Barrier Reef of Queensland at Whitsundays Islands. The owner of the company is Paul and Alice and they offers tours and travels with catered and staffed with the sail boats. The company currently have 6 sailing yachts, 6 skip...

Read More arrow Tags: Australia Arlington Management University of New South Wales 

INF20011 Mobile Business And Social Media

Download : 0 | Pages : 2

Answer: Social media of Michael Kors Michael Kors use Tweeter and LinkedIn on which the company maintain different accounts to share the information to their customers. Twitter There are different accounts, which are managed by the company from which the five essential accounts include Michael Kors verified account, Michael Kors Bags, Michael Kors outlet, MichaelKors.Giveaway and John M. Jones. All the accounts of the company are used to ge...

Read More arrow Tags: Australia Arlington Management University of New South Wales 

CIS502 Information Systems For Decision Making

Download : 0 | Pages : 13

Answer: Introduction Business Continuity planning can be defined as the method which focuses on creating a system for preventing and recovery of different threats for a firm. The plan aims to emphasize that all the personnel and assets are completely protected. It aims in providing quick function in case of disaster. BCP emphasizes on convenience personnel in advance which requires input from different individual from some of the key stakehol...

Read More arrow Tags: United States 7  Information Systems Security Professional 2018 Other 

INF80043 IT Risk Management Project

Download : 0 | Pages : 22

Answer: Introduction Background of the Organization ACORN or Young Acorn Foundation is a tier 2 NFP organization. They are focused on the community development within marginalized areas. ACORN is mainly operating in the Asia and Pacific regions and has a presence in every major city of Australia, Asia and Pacific countries for successful coordination of community development activities or CDA and fund-raising campaigns. ACORN even launched a...

Read More arrow Tags: Australia Melbourne 7 IS/IT Risk Management Project Other 
Next
watch

Save Time & improve Grade

Just share Requriment and get customize Solution.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,382,993

Orders

4.9/5

Overall Rating

5,085

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

2632 Order Completed

100% Response Time

Albert Ambrosio

MSc in Nursing

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

755 Order Completed

95% Response Time

Douglas Cowley

Masters in Finance with Specialization in Audit

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

798 Order Completed

97% Response Time

Benjamin Blakeman

MSc in Medical Technology

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1592 Order Completed

96% Response Time

Jane Sima

Ph.D in Psychology with Specialization in Industrial-Organizational Psychology

Singapore, Singapore

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

Awesome work. Awesome response time. Very thorough & clear. Love the results I get with MAH!

flag

User Id: 383727 - 31 Jul 2020

Australia

student rating student rating student rating student rating student rating

Work was done in a timely manner took it through grammarly checked for plagiarism very well satisfied

flag

User Id: 463334 - 31 Jul 2020

Australia

student rating student rating student rating student rating student rating

Great work for the short notice given. Thank you for never disappointing and helping out.

flag

User Id: 194216 - 31 Jul 2020

Australia

student rating student rating student rating student rating student rating

I received a full point on the assignment. Thank you for all the help with the assignment.

flag

User Id: 411395 - 31 Jul 2020

Australia

student rating student rating student rating student rating student rating
callback request mobile
Have any Query?