720CB804-94BB-42D9-B1D3-D7FEA6CC95E5
.
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
H7162
Subject
Computer Science
Date
Dec 6, 2023
Type
Pages
1
Uploaded by SargentNewt2569 on coursehero.com
7:51
ol
56+
LD
CYB
250
Discussion
Four
,
Robert
Maharaj
posted
Nov
12,
2023
2:27
PM
W
Subscribed
Hi
everyone,
Adopting
the
latest
Cybersecurity
technologies
enables
organizations
or
individuals
to
enhance
their
security
posture
and
mitigate
risk.
During
Discussion
One,
|
chose
to
discuss
behavioral
biometrics
as
a
centralized
workplace
security
technology.
This
technology
used
machine
learning
of
algorithms
to
analyze
individual
user
patterns
or
behaviors.
The
use
of
which
can
identify
patterns
that
are
uniquely
different
from
each
user.
With
the
adoption
of
this
new
technology
there
are
several
key
aspects
to
consider
in
regards
to
the
CIA
triad.
Beginning
with
Availability,
all
software
is
prone
to
systematic
failures
or
can
become
affected
by
natural
disasters.
It
can
further
be
affected
if
the
user
biometric
data
is
compromised,
as
it
cannot
be
reset
and
professional
input
would
be
required.
When
looking
at
confidentiality
of
the
software
a
few
items
are
notable
including
some
users
may
not
understand
how
their
data
is
stored
and
have
privacy-related
concerns,
and
attackers
can
obtain
biometric
data
without
the
targeted
individuals
consent
or
knowledge.
For
integrity,
accuracy
of
the
system
is
critical
to
tell
each
individual
user
apart
and
thwart
off
potential
attackers.
This
can
also
be
impacted
by an
attacker
tampering
with
the
system
and
uploading
new
biometric
data.
@
learn.snhu.edu
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
legal apects of cybersecurity
Which of the following best summarizes the definition of privacy identified by LouisBrandeis and Samuel Warren?A. Privacy is about the choices individuals make.B. Privacy is the right to be let alone.C. Privacy is solitude.D. Privacy is avoidance of others.
arrow_forward
An online store website is looking to upgrade their systems and practices: stronger encryption for customer information, b) a system for detecting when unauthorized users are trying to access their site, and c) a way to train their staff on how to keep customer and company information more secure so they will not be a victim of cyberattack.
Design a finite state machine to model the identification and authentication process when 2-Factor Authentication is used. Identify states and state transitions. Assume that inputs are valid or invalid usernames and valid or invalid authentication factors, and outputs are messages for the user. Make sure to include explanations.
arrow_forward
1. What methods does a social engineering hacker use to gain information about a user’s login ID and password? How would this method differ if it targeted an administrator’s assistant versus a data-entry clerk?
2. Consider the information stored in your personal computer. Do you currently have information stored in your computer that is critical to your personal life? If that information became compromised or lost, what effect would it have on you?
3. There are a number of professional organizations for computer security. Search for two organizations and share the websites and descriptions of those organizations. Share that information here:4. Choose two of the US federal agencies listed in Chapter 3 that deal with computer/cybercrime. List at least three differences, in terms of reach or responsibility, between the two organizations.
arrow_forward
a. Intrusion detection is based on the assumption that the behavior of the intruder differs from that of a legitimate user in ways that can be quantified. Of course, we cannot expect that there will be a crisp, exact distinction between an attack by an intruder and the normal use of resources by an authorized user. This poses a challenge to the use of IDS. Briefly discus the challenges and propose a cure.
b. Blockchain is a breakthrough technology that is expected to alter most industries in the coming years and it particularly touted so because of confidentiality, authentication and integrity that it offers which makes it independent, transparent and secure. Experts says that these important principles of security are achievable because blockchains employs hash functions and public key encryption. Briefly discuss how these cryptographic techniques offer confidentiality, authentication and integrity that gives blockchain its security.
arrow_forward
"In web design, what are the most crucial factors to take into account?" The blockchain is a game-changing technology that offers privacy, authenticity, and integrity. Additionally, it is decentralized, open, and trustworthy. Hash functions and public key encryption are said to be used by blockchains in order to meet these essential security principles, as stated by many experts. Explain how these different cryptographic techniques help to ensure the confidentiality, authenticity, and integrity of the blockchain.
arrow_forward
1. Why is phishing, and social engineering generally, difficult to address or prevent withtechnological controls?2. An internet site starts distributing a program that gets a popular word processor to send acopy of whatever files it produces to be emailed to a specific email address. Is this avulnerability, an exploit, or a security incident?3. Briefly explain the Cyber-Risk function below:���� ≜ � { Threats , Vulnerability,Asset Value}4. What is a hash function, and what can it be used for?5. a. A Banking systems analysts is reported to siphoning a customer’s account. Brieflydiscuss if this is a vulnerability, an exploit or a security incident?b. Based on the Asset Value, briefly discuss the statement: “Computer security should beperiodically reassessed”. You may be guided by the urgency and criticality of theinformation assets.6. Briefly discuss the extent to which insiders or “frenemies” may pose security challengesto the organization.7. What is a cryptographic key, and what is it…
arrow_forward
7. Please write in complete sentences
a. Explain how the SNMP engine ID is set and its importance in SNMPv3. It is expected to give all details but not the actual correct codes for types.
b. Explain the types of User Based Security Model and what is used for authentication and privacy in each type.
c. State the possible threats that authentication and privacy is designed to eliminate in SNMPv3.
arrow_forward
In lecture we discussed the concept of the "good team" and the "bad team." The idea of right and wrong can often get skewed in the minds of individual actors. They may believe they are fighting for the right cause, such as when hackers associated with Anonymous took down the Russian news site RT News, a media outlet largely viewed as propaganda, in response to the Russian invasion of Ukraine. These hackers utilized illegal tactics to take down a government run news agency, in a classic argument of "the ends justifies the means." Although you may agree with what this "hacktivist" team did, consider the second and third order effects. Were people unable to get weather updates? Was any portion of emergency broadcasts disrupted due to this hack? How many more attacks will Russian sponsored hackers execute in response?
arrow_forward
This question relates to the ethical issues associated with information technology.
Consider the ten commandments of computer ethics provided in the textbook. Select any five ofthese commandments. Then, find one published example that describes a violation of each of theselected commandments.Note: The violation identified should be described.
arrow_forward
1. Analyzed the Problem And Solve The Problem
A. Explain the difference between SNMPv1 and SNMPv2 and why is SNMPv1 not considered safe, so that a hacker can exploit security holes?
B. Explain why SNMP can't be named as an application that transforms objects
arrow_forward
Cybersecurity discussion
In 2013, Edward Snowden was hired by the NSA after previous employment with the CIA as a systems administrator. In early June of 2013 he revealed thousands of classified NSA documents to journalists Glenn Greenwald, Laura Poitras, Barton Gellman, and Ewen MacAskill about government surveillance programs. By June 21, 2013, the United States Department of Justice unsealed charges against Edward Snowden of two counts of violating the Espionage Act of 1917 and theft of government property, which identified the leak of state secrets as an act of treason.
Snowden has become a subject of controversy, both ethically and legally being seen as a traitor, a hero, a whistleblower, a dissident, and patriot.
Data Security and Privacy in the Age of Surveillance (Links to an external site.)
Edward Snowden: Patriot or Traitor? (Links to an external site.)
Edward Snowden is Both A Patriot and A Traitor (Links to an external site.)
Using the above short video and articles…
arrow_forward
The Internet has emerged as a vital platform for the exercise of First Amendment rights to free expression. Twitter and Facebook have become popular vehicles for the dissemination of extremist propaganda by both individuals and groups. Should there be no limits placed on expression in cyberspace? To what extent should hate speech be suppressed on social media?
arrow_forward
Could you please help with the question below please and thank you I need it as detailed as possible: This is not a graded question just a practice question...
Info:
Honeytokens - Lance Spitzner, the leader of the Honeynet Project, has defined the term honeytoken as “a digital or information system resource whose value lies in the unauthorized use of that resource"
- Helps to track whether the information is being stolen or not.
- For example, hospital security will make fake accounts on the medical data of individuals for example, and if someone accesses that account, it means the system has been compromised.
More info:
Honeytokens
Lance Spitzner, the leader of the Honeynet Project, has defined the term honeytoken as “a digital or information system resource whose value lies in the unauthorized use of that resource” [5]. Honeytokens can be any digital data. They can consist of documents, images, or even data such as a phony login/password combination. A honeytoken may be any…
arrow_forward
Analyze the following scenario: An employee using company resources sends email that is later retrieved when the employee sues the company. Is there a reasonable expectation of privacy? Is it different if the computer used was purchased by the employee but the email was sent during work hours? What additional facts or changes in your assumptions would alter your analysis? Ethically, what are the arguments, pro and con, for an employer monitoring electronic communication?
arrow_forward
Discuss the myth of unbreakable code including the most common code-breaking techniques. Can encryption algorithms be broken? Research frequency analysis, brute force attack or other code-breaking methods. Describe the use of one of these techniques
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Related Questions
- legal apects of cybersecurity Which of the following best summarizes the definition of privacy identified by LouisBrandeis and Samuel Warren?A. Privacy is about the choices individuals make.B. Privacy is the right to be let alone.C. Privacy is solitude.D. Privacy is avoidance of others.arrow_forwardAn online store website is looking to upgrade their systems and practices: stronger encryption for customer information, b) a system for detecting when unauthorized users are trying to access their site, and c) a way to train their staff on how to keep customer and company information more secure so they will not be a victim of cyberattack. Design a finite state machine to model the identification and authentication process when 2-Factor Authentication is used. Identify states and state transitions. Assume that inputs are valid or invalid usernames and valid or invalid authentication factors, and outputs are messages for the user. Make sure to include explanations.arrow_forward1. What methods does a social engineering hacker use to gain information about a user’s login ID and password? How would this method differ if it targeted an administrator’s assistant versus a data-entry clerk? 2. Consider the information stored in your personal computer. Do you currently have information stored in your computer that is critical to your personal life? If that information became compromised or lost, what effect would it have on you? 3. There are a number of professional organizations for computer security. Search for two organizations and share the websites and descriptions of those organizations. Share that information here:4. Choose two of the US federal agencies listed in Chapter 3 that deal with computer/cybercrime. List at least three differences, in terms of reach or responsibility, between the two organizations.arrow_forward
- a. Intrusion detection is based on the assumption that the behavior of the intruder differs from that of a legitimate user in ways that can be quantified. Of course, we cannot expect that there will be a crisp, exact distinction between an attack by an intruder and the normal use of resources by an authorized user. This poses a challenge to the use of IDS. Briefly discus the challenges and propose a cure. b. Blockchain is a breakthrough technology that is expected to alter most industries in the coming years and it particularly touted so because of confidentiality, authentication and integrity that it offers which makes it independent, transparent and secure. Experts says that these important principles of security are achievable because blockchains employs hash functions and public key encryption. Briefly discuss how these cryptographic techniques offer confidentiality, authentication and integrity that gives blockchain its security.arrow_forward"In web design, what are the most crucial factors to take into account?" The blockchain is a game-changing technology that offers privacy, authenticity, and integrity. Additionally, it is decentralized, open, and trustworthy. Hash functions and public key encryption are said to be used by blockchains in order to meet these essential security principles, as stated by many experts. Explain how these different cryptographic techniques help to ensure the confidentiality, authenticity, and integrity of the blockchain.arrow_forward1. Why is phishing, and social engineering generally, difficult to address or prevent withtechnological controls?2. An internet site starts distributing a program that gets a popular word processor to send acopy of whatever files it produces to be emailed to a specific email address. Is this avulnerability, an exploit, or a security incident?3. Briefly explain the Cyber-Risk function below:���� ≜ � { Threats , Vulnerability,Asset Value}4. What is a hash function, and what can it be used for?5. a. A Banking systems analysts is reported to siphoning a customer’s account. Brieflydiscuss if this is a vulnerability, an exploit or a security incident?b. Based on the Asset Value, briefly discuss the statement: “Computer security should beperiodically reassessed”. You may be guided by the urgency and criticality of theinformation assets.6. Briefly discuss the extent to which insiders or “frenemies” may pose security challengesto the organization.7. What is a cryptographic key, and what is it…arrow_forward
- 7. Please write in complete sentences a. Explain how the SNMP engine ID is set and its importance in SNMPv3. It is expected to give all details but not the actual correct codes for types. b. Explain the types of User Based Security Model and what is used for authentication and privacy in each type. c. State the possible threats that authentication and privacy is designed to eliminate in SNMPv3.arrow_forwardIn lecture we discussed the concept of the "good team" and the "bad team." The idea of right and wrong can often get skewed in the minds of individual actors. They may believe they are fighting for the right cause, such as when hackers associated with Anonymous took down the Russian news site RT News, a media outlet largely viewed as propaganda, in response to the Russian invasion of Ukraine. These hackers utilized illegal tactics to take down a government run news agency, in a classic argument of "the ends justifies the means." Although you may agree with what this "hacktivist" team did, consider the second and third order effects. Were people unable to get weather updates? Was any portion of emergency broadcasts disrupted due to this hack? How many more attacks will Russian sponsored hackers execute in response?arrow_forwardThis question relates to the ethical issues associated with information technology. Consider the ten commandments of computer ethics provided in the textbook. Select any five ofthese commandments. Then, find one published example that describes a violation of each of theselected commandments.Note: The violation identified should be described.arrow_forward
- 1. Analyzed the Problem And Solve The Problem A. Explain the difference between SNMPv1 and SNMPv2 and why is SNMPv1 not considered safe, so that a hacker can exploit security holes? B. Explain why SNMP can't be named as an application that transforms objectsarrow_forwardCybersecurity discussion In 2013, Edward Snowden was hired by the NSA after previous employment with the CIA as a systems administrator. In early June of 2013 he revealed thousands of classified NSA documents to journalists Glenn Greenwald, Laura Poitras, Barton Gellman, and Ewen MacAskill about government surveillance programs. By June 21, 2013, the United States Department of Justice unsealed charges against Edward Snowden of two counts of violating the Espionage Act of 1917 and theft of government property, which identified the leak of state secrets as an act of treason. Snowden has become a subject of controversy, both ethically and legally being seen as a traitor, a hero, a whistleblower, a dissident, and patriot. Data Security and Privacy in the Age of Surveillance (Links to an external site.) Edward Snowden: Patriot or Traitor? (Links to an external site.) Edward Snowden is Both A Patriot and A Traitor (Links to an external site.) Using the above short video and articles…arrow_forwardThe Internet has emerged as a vital platform for the exercise of First Amendment rights to free expression. Twitter and Facebook have become popular vehicles for the dissemination of extremist propaganda by both individuals and groups. Should there be no limits placed on expression in cyberspace? To what extent should hate speech be suppressed on social media?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning