SEC571 Full Course Latest 2019 January Question # 00598652 Subject: Education Due on: 02/28/2019 Posted On: 02/28/2019 12:38 PM Tutorials: 1 Rating: 4.8/5

Question

Dot Image

SEC571
Principles of Information Security and Privacy

Week 1
Discussion

DQ1 VULNERABILITIES OF YOUR SYSTEMS?

We’re spending some time this week coming up with a common
understanding of security terminology, and vulnerability is one of those
fundamental terms. While the word weakness seems to define it pretty well,
there are a number of ways that information systems can become vulnerable. Acts
of commission or omission can be equally responsible for a system
vulnerability. What about your systems, both at home and at work? In what ways
are they vulnerable?

DQ2 THREATS AGAINST YOUR SYSTEMS?

It’s a pretty rough world out there for data. While a large
percentage of information technology security budgets is devoted to reducing
the risk of malicious attacks, there are other ways in which systems or data
become damaged. What threats are you aware of when it comes to your personal
systems and the systems at your job?

SEC571
Principles of Information Security and Privacy

Week 2
Discussion

DQ1 SECURITY ISSUES IN TELECOMMUNICATIONS

What are the advantages and disadvantages of virtual
offices, including telecommuting? What are the security and management issues
concerning virtual offices, especially hooked up into large virtual networks?
Please comment on the views of your fellow students here.

DQ2 WHAT ACCESS CONTROLS ARE IN USE?

What are your organization’s assets? Are there any access
controls in place? How effective are they? How can you tell? What are the
weaknesses in the controls? Are any new or upgraded access controls being
considered? Let’s explore this substantial component of information security.

SEC571
Principles of Information Security and Privacy

Week 3
Discussion

DQ1 CRYPTOGRAPHIC PRODUCTS

As we are learning, there are a lot of uses for cryptography
in information technology, and there are a lot of different algorithms,
cryptographic processes, key lengths, implementation methods, and so on. Let’s
explore the world of cryptographic products. What’s available out there? What
kind of quality is found in free, open-source products? What types of hardware
devices? What types of software implementations? How are they used? What
problems do they solve? How effective are they? How can you tell? What are the
tradeoffs between security and business process efficiency?

Let’s start with everyone presenting one cryptographic
product (past, present, or future). No duplications, please, so be sure to read
all the previous posts. Then, respond to the posts of your classmates with
questions, additional information, and so forth.

DQ2 CRYPTOGRAPHIC STANDARDS

Ever since World War II and the ensuing Cold War,
cryptographic methods have been the source of much government angst. Protecting
the information of one’s own government and accessing the data of other
governments has been a preoccupation of many nations. With the growth of
civilian computer networks in the 1980s and the development of Internet-based
e-commerce in the 1990s, concerns about data security spread from governments
to the public sector. The tension between the government’s goal of control of
cryptographic methods and business’ need for internationally trustworthy
security resulted in skirmishes between the two.

Let’s discuss the modern history of cryptography in terms of
commercial-governmental tensions. What can you find out about this? What are
the considerations when determining how to standardize cryptographic methods?
How are cryptographic methods regulated? What are the different laws that
govern the use of cryptography? Are they reasonable? Whose interests are most
important when determining the extent to which cryptography should be
standardized, regulated, and mandated?

SEC571
Principles of Information Security and Privacy

Week 4
Discussion

DQ1 NETWORK SERVICES

Users are familiar with some network services such as HTTP
(Hypertext Transport Protocol) – the Web; and SMTP (Simple Mail Transport
Protocol) and POP (Post Office Protocol) – e-mail and instant messaging. But
there are others like DHCP (Dynamic Host Configuration Protocol), DNS (Domain
Name System), FTP (File Transport Protocol), NNTP (Network News Transport
Protocol), Telnet, SSH (Secure Shell), SSL-TLS (Secure Sockets Layer-Transport
Layer Security) and others that the average user may not have heard of.

Tell us more about these services. How do they figure into
organizational security? What are the most recent threats against them? What
are the risks associated with attacks against network services? What are
possible consequences? What are specific controls and general best practices to
mitigate risk?

Jump right in. Do a little research on some part of network
service security and share with us your findings as well as your experiences
and opinions. And, of course, please respond to your classmates’ posts with
ideas, questions, comments, other perspectives, and so forth.

DQ2 SECURITY ARCHITECTURE

Think about your organization’s security architecture. How
much do you know about it? How much do other workers know? How easy is it to
learn more? Does your perception of the organization’s security architecture
seem appropriate for the mission and goals of the organization? How much
management commitment to security do you sense?

Briefly describe your organization, but please DON’T reveal
any specific security details that would compromise your organization’s
security controls. Feel free to make up a name and even alter the products or
services the organization offers to maintain its anonymity as needed. What we
should discuss is the general nature of the business, your role, your view on
the organization’s security architecture, and what you think the ideal security
architecture should be for your organization.

As we get moving on this discussion, consider the ideas of
your classmates. Would they be appropriate for your organization? Even if you don’t
have much connection with the security activities in your company, what do you
THINK would be appropriate?

As always, post early, post often, and address the posts of
your classmates.

SEC571
Principles of Information Security and Privacy

Week 5
Discussion

DQ1 CASE STUDY – WOULD YOU HIRE GOLI?

How would you respond if Goli (Situation VIII: Ethics of
Hacking or Cracking, pp. 759-761 in the textbook) came to you describing a
vulnerability in your system and offering to help fix it? What would incline you
to hire her? What would disincline you from doing so? Please explain your
answer and also reply to the comments of others.

DQ2 PRIVACY: RIGHT OR PRIVILEGE?

Privacy seems to mean different things to different people.
What does privacy mean to you? Is privacy a right or a privilege? How should
one’s privacy be legally protected or secured, especially when using the
Internet? Maybe this is not absolutely possible; protection may always be
viewed as a relative term. Why or why not? Please comment on the responses of
other students.

SEC571
Principles of Information Security and Privacy

Week 6
Discussion

DQ1 BC AND DR

Business Continuity (BC) planning and Disaster Recovery (DR)
planning are key elements in organizational security architectures. What is the
difference between them and why is it important to know the difference when
representing security proposals to management?

DQ2 MEETING REGULATIONS

With what federal, state, and/or organizational regulations
regarding information systems and data management must your organization
comply? How can you identify these regulations? How can you remain informed
about changes in these requirements? How can your organization or industry
influence these regulations?

SEC571
Principles of Information Security and Privacy

Week 7
Discussion

DQ1 PERSONAL/GROUP ETHICS

What is ethics? Is it a cultural standard or an individual
standard? Do managers have a responsibility to maintain an ethical standard
within a department? If so, how is the expected ethical standard established?
How is it documented? How is compliance measured? What happens when an
individual’s ethical standard conflicts with the group standard? How should
members of the group react? How should the individual react?

DQ2 SECURITY SKILLS

What skills are needed by personnel working in information
security? List some job titles in the field and come up with some required
qualifications and some desirable qualifications. Take a look at some job
listings and resumes for ideas. After all, you may be applying for one of these
jobs soon!

SEC571
Principles of Information Security and Privacy

Week 1 Quiz

Question 1

(TCO A) Describe an
organizational information situation where data confidentiality would be more
important than data availability or integrity.

Question 2

(TCO A) Which of the
following is the weakest password?

rT%b9

2a$xY60

vG&3n9c

8d$iuR4

%s94Nd6

Question 3

(TCO A) While our
focus in the course is on threats to information systems, this question focuses
on the concept of threats, vulnerabilities, and controls as applied to other
kinds of systems. Select two examples of threats to automobiles for which auto
manufactures have instituted controls. Describe the vulnerabilities for which
the controls were created and assess the effectiveness of these controls giving
the justification for your assessment. Your answer does not need to address
information security but you need to demonstrate your understanding of the
terms: threat, vulnerability, and control. (Note: specific answers to this
question are not in the assigned reading material.)

Question 4

(TCO A) What
advantages does authentication with biometrics has over passwords?

Question 5

(TCO A) Network
enumeration is used to _______________________.

test for
vulnerabilities

determine what
service and operating systems are running

determine what
exploits have been committed

close security flaws

Question 6

(TCO A)
Virtualization is an operating system security technique. In the context of
virtualization, explain what hypervisor does.

SEC571
Principles of Information Security and Privacy

Week 4
Midterm

Question 1

(TCO A) What are the four kinds of security threats? Give
two examples of each.

Question 2

(TCO A) Explain the primary advantage of virtualization used
in security of an operating system.

Question 3

(TCO B) It’s been said that firewalls are dead. Some think
that, because of the prevalence of application-layer attacks, packet filtering
firewalls are of no real use in protecting networks. Name an advantage of using
packet filtering firewalls in modern networks.

Question 4

(TCO C) Describe how asymmetric encryption is used to send a
message from User A to User B that assures data confidentiality,
authentication, and integrity. Be specific as to the keys used and how they
achieve the three goals.

Question 5

(TCO B) Which of the following is a correct statement?

A SYN
flood involves an attacker sending a stream of acknowledgements.

In
link encryption, packet confidentiality is assured from sending to receiving
host.

Access
control is limiting who can access what in what ways.

SSL assures data confidentiality within the
recipient’s network.

None
of the above

SEC571
Principles of Information Security and Privacy

Week 8 Final
Exam

Question 1

(TCO A) You have designed a database. During testing you
discover that if, during the normal entry and modification of data, there is a
power outage, when the system is recovered, records may contain some of the new
data that were being entered but that some old data that should have been
modified, were left untouched. Explain how you could modify your database
design to eliminate this type of compromise of data integrity.

Question 2

(TCO B) Compare and contrast Intrusion Detection System
(IDS) versus Intrusion Prevention System (IPS). Are they mutually exclusive?
Explain.

Question 3

(TCO C) Why is a firewall usually a good place to terminate
a Virtual Private Network (VPN) connection from a remote user? Why not
terminate the VPN connection at the actual servers being accessed? Under what
circumstances would VPN termination at the server be a good idea?

Question 4

(TCO D) A computer programmer has been arraigned for a
computer crime. She is suspected of having accessed system files on a public
Web server. The programmer’s attorney argues that his client was only trying to
determine if the website was secure and that no harm was done to the Web server
or its system files. The programmer’s attorney also argues that it is possible
that the log files that show that his client accessed system files were
tampered with. The attorney claims that the Web server was made accessible to
the public anyway so that there was no violation of the law and that the
arraignment against her client should be thrown out. You’re the judge. What is
your analysis of these arguments?

Question 5

(TCO E) List five controls that could be used to maintain
data availability in a networked environment.

Question 6

(TCO F) In the U.S., laws are enforced by police agencies
and the courts. What are ethics and who enforces them?

Question 7

(TCO G) Which of the following statements is true?

From a
legal point of view, it is easier to return software to a store because it
doesn’t meet your needs than it is to do so because the software is of poor quality.

If a programmer is, i)
supervised in his work, ii) subject to being fired by his employer, iii)
directed in his work by his employer, and iv) under contract for the work he is
doing, it is most likely true that the programmer is considered the author of
the work he has produced.

A
civil judge cannot find that a plaintiff has been harmed and hold a defendant
liable if the defendant has violated no written law.

It is
easier to prove guilt in a criminal case than it is in a civil case.

A
company is not required to protect trade secrets in order to maintain legal
protection of the proprietary information.

Question 8

(TCO H) The CIO at your organization wants you to assess a
plan to replace the current username/password authentication methods with
fingerprint biometric authentication approach that requires users to use their
fingerprints to access any computing system. Assess three downsides to this
approach.

SEC571
Principles of Information Security and Privacy

COURSE
PROJECT

Security Assessment and Recommendations

Overview

This course does involve a lot of technical information and
theory, but what really matters is how this knowledge can be used to identify
and remediate real-world security issues. What you learn in this course should
be directly applicable to your work environment. The course project that you
will complete is designed to further this goal. In the first part of the
project, you will choose an organization from one of two given scenarios
(below) and identify potential security weaknesses, and in the second part of
the project, you will recommend solutions. The first part of the project is due
in Week 3, and the second part of the project, along with the first part
(presumably revised based on instructor feedback) is due in Week 7. This
project constitutes a significant portion of your overall grade. This is an
individual assignment and may not be completed in teams.

Guidelines

Phase I – Identify potential weaknesses from either the
Aircraft Solutions or Quality Web Design Company

In this phase, you will choose either Aircraft Solutions or Quality
Web Design as the company you will work with. The scenarios are in the Files
section in the Course Project select area. You will then identify potential
security weaknesses.

Security weaknesses – You must choose two from the following
three areas (hardware, software, and policy – excluding password policies) and
identify an item that requires improved security.

To define the asset or policy with sufficient detail to
justify your assessment, your assessment must include:

the vulnerability associated with the asset or policy

the possible threats against the asset or policy

the likelihood that the threat will occur (risk)

the consequences to mission critical business processes
should the threat occur

how the organization’s competitive edge will be affected
should the threat occur

To clarify an item that requires improved security, you must
identify one of these items:

one hardware and one software weakness

one hardware and one policy weakness

one software and one policy weakness

Other required elements include:

Cover sheet

APA-style

In-text citations and Reference section

Minimum length 3 pages, maximum length 5 pages (not counting
cover sheet, diagram(s), references). Do not exceed the maximum length.

Phase II: the
Course Project (comprised of Phase I and II) – Recommend solutions to the
potential weaknesses from either the Aircraft Solutions or Quality Web Design
Company

In this phase of the project you will include Part I
(presumably improved as needed based upon Week 3 feedback) and then you will
recommend solutions for the security weaknesses you identified in the Phase I.

Definition of the solution – Hardware solutions must include
vendor, major specifications with an emphasis on the security features, and
location of placement with diagram. Software solutions must include vendor and
major specifications, with an emphasis on security features. Policy solutions
must include the complete portion of the policy that addresses the weakness
identified. Any outsourced solution must include the above details and the
critical elements of the service level agreement.

Justification – You must address the efficacy of the
solution in terms of the identified threats and vulnerabilities; the cost of
the solution, including its purchase (if applicable); and its implementation,
including training and maintenance.

Impact on business processes – You must discuss any
potential positive or negative effects of the solution on business processes
and discuss the need for a trade-off between security and business requirements
using quantitative rather than simply qualitative statements.

Other required elements include:

Cover sheet

APA-style

In-text citations and Reference section

5 reference minimum

Minimum length of solutions: 6 pages, maximum length 10
pages (not counting cover sheet, diagram(s), references). Do not exceed the
maximum length.

Grading Rubrics

The course project will consist of two deliverables:

Phase I (Identify potential weaknesses from either the
Aircraft Solutions or Quality Web Design Company); and Phase II: the Course
Project (comprised of Phases I and II – Recommend solutions to the potential
weaknesses from either the Aircraft Solutions or Quality Web Design Company).

The grading standards for each deliverable are as follows:

Phase I (Identify potential weaknesses from either the
Aircraft Solutions or Quality Web Design Company)

Category Points Description

Security Weaknesses 80 Identifies two plausible and
significant weaknesses from required list (hardware, software, policy).
Includes realistic vulnerability(s) associated with the asset or policy,
plausible and likely threats against the asset or policy, an estimation of the
likelihood that the threat will occur (risk), the consequences to mission
critical business processes should the threat occur, and how the organization’s
competitive edge will be affected should the threat occur.

Presentation 20 Writing quality and flow demonstrates
a graduate-level writing competency and does not contain misspellings, poor
grammar, incorrect punctuation, and questionable sentence structure (syntax
errors).

Total 100 A quality paper will meet or exceed all
of the above requirements.

Phase II – the Course Project (comprised of Phase I and II)
– Recommend solutions to the potential weaknesses from either the Aircraft
Solutions or Quality Web Design Company

Category Points Description

Security Weaknesses 60 Identifies two plausible and
significant weaknesses from required list (hardware, software, policy).
Includes realistic vulnerability(s) associated with the asset or policy,
plausible and likely threats against the asset or policy, an estimation of
likelihood that the threat will occur (risk), the consequences to mission
critical business processes should the threat occur, and how the organization’s
competitive edge will be affected should the threat occur

Definition of Solution 30 Includes vendor and major
specifications, and identifies the relevant security features as related to the
weakness identified. If hardware, includes location of placement with diagram.
Policy solutions include the complete portion of the policy that effectively
address the weakness identified. Any outsourced solution must include the above
details and the critical elements of the service level agreement.

Justification 30 Demonstrates the efficacy of the
solution in terms of the identified threats and vulnerabilities. Includes
complete costs, including purchase, implementation, training, and maintenance
as needed.

Impact on Business Processes 25 Addresses plausible, potential
positive, or negative effects on business processes. Discusses trade-off
between security and business requirements using quantitative statements.

Presentation 25 Writing quality and flow demonstrates
a graduate-level writing competency and does not contain misspellings, poor grammar,
incorrect punctuation, and questionable sentence structure (syntax errors).

Total 170 A quality paper will meet or exceed all
of the above requirements.

Best Practices

Course projects cause many students anxiety. Some anxiety is
probably healthy; it means you want to do a good job. But too much anxiety
usually interferes with performance. There is writing assistance available in
the Tutor Source link in the Introduction & Resources Module and here are
some tips you may want to consider as you plan and create your course project.

Read the Course Project Requirements and the Course Project
Sample Template (in the Files section) early. Here’s why: if you have in mind
the required specifications of the ssignment as you start the weekly
assignments and other activities, you’ll be able to recognize when you come
across information that you might want to use in your project.

Keep a separate project notebook. Don’t worry about keeping
it highly organized and documented; just jot down ideas as they come to you. You’ll
be surprised how much anxiety you prevent by simply having ideas ready when you
sit down to write.

Use the “mull” method. This means spend a few days mulling
over the assignment. Don’t force yourself to think about it, but, if you’ve
read over the project requirements and have your project notebook with you as
you do your regular class activities and your regular daily activities, your
brain will work on the assignment all by itself. As it does so, more ideas will
come to you and all you have to do is jot them down.

Don’t try to write the paper from the beginning to the end
correctly the first time. If you do, you’ll probably forget all kinds of things
and your sentence structure and word choice, not to mention spelling and
grammar, will likely not be as good as it should be. Don’t edit as you write.
Just write. That way the ideas can come out with less effort. Edit later.

Use your text to help you get ideas. For example, when
considering vulnerabilities, check the index at the back of the text for the
word “vulnerabilities” and browse through those pages. When you’re designing
the network, look through the chapter on security in networks.

Use available sources such as the DeVry Library, our course
Lectures, discussions, other books, journals, the Internet, and so forth.

Keep a digital notebook. When you find an interesting
article (or even an article that looks as if it could be useful), copy it and
paste it into your document along with the address (URL), date, author, and so
forth. You can read through these later and keep what seems useful and discard
the rest.

Make a schedule and keep to it. For example, you may set
aside an hour to research topics. Use the suggestion in #7, pasting down
articles and parts of articles to read later. Set aside another hour or two
later to read through the material you collected. If it’s of no use, delete it
so that your digital notebook becomes more refined and useful. If you start
work early and schedule smallish times to do your work, you’ll find that, a)
you learn a lot more, b) you have much less anxiety, and c) you end up with a
better grade. Try it!

Ask questions. The Course Q & A forum in the discussions
in the course shell is an excellent place to ask questions. This isn’t
cheating; this is working together to increase everyone’s knowledge. You’re not
asking someone to write your paper, you’re asking for ideas (or answering other
students’ questions). Contact your instructor with questions. Your instructor
is the expert on what is expected, so use this resource.

Read about APA-style citations by clicking the link, APA
Guidelines for Citing Sources, near the bottom of the Course Syllabus. You will
save a lot of time by addressing these style issues as you write your paper
rather than trying to do this at the end.

Having Trouble Meeting Your Deadline?

Get your assignment on SEC571 Full Course Latest 2019 January Question # 00598652 Subject: Education Due on: 02/28/2019 Posted On: 02/28/2019 12:38 PM Tutorials: 1 Rating: 4.8/5 completed on time. avoid delay and – ORDER NOW

Once you’ve written your rough draft, start the editing
process:

Look over the Course Project Requirements, particularly the
Grading Standards, and make sure that you’ve addressed every element that is
required.

Remove any unnecessary sentences or phrases. This project is
not supposed to be long (remember that there is a 12-page maximum for the final
project – not counting the cover page, graphics, references, etc.), it’s
supposed to be good. Any extra wording should be deleted. For example, “All of
these weaknesses happen on a regular base and in order to make sure that they
do not occur, the company needs to step in and make modification that will not
only correct existing issues but prevent future ones as well,” could be written
effectively as, “These vulnerabilities are ongoing and action needs to be
taken.”

The key to good technical or business (and some would say
creative) writing is being clear and effective. Don’t try to make the paper
sound “educated.” For example, instead of writing “This document is set forth
to identify and address potential security issues…,” just say what you need to
say. Much better would have been, “This report addresses security issues….”
This type of clear writing is a lot easier on the writer and on the reader.

When you use an acronym for the first time, spell it out.
For example, “…the use of a VPN (virtual private network) is common among….”
After that, just use the acronym.

Whenever you use pronouns like “it” or “they” that refer to
something mentioned earlier, be sure that it is clear to what or to whom “it”
or “they” refer. For example, “The company has implemented a firewall at
corporate headquarters and a packet filtering router at the branch office. It
has functioned well since then.” In this case, the “It” could refer to the
company, the firewall, the headquarters, the branch office, or the packet
filtering router. Clearer would be, “The company has implemented a firewall at
corporate headquarters and a packet filtering router at the branch office.
Network perimeter security has functioned well since then.”

Read your work out loud. You may find lots of little
mistakes and sentence structure errors this way.

Use spell check and grammatical correction features of your
word processing software, but don’t rely on them. Correctly spelled words will
two often be red as bean write when they are whey off.

Proofread when you are not tired and when you have had some
time away from your work on the paper. Your goal should be to catch ALL
mistakes or omissions. Professional or academic papers that contain errors send
a message to the reader that a) you are not a reliable source of information or
b) you don’t care about the reader. Neither of these may be true but, that’s
the message you send when you send errors.

Be sure that all ideas that you got from outside sources are
accompanied by an in-text citation (not a footnote) and that the in-text
citation refers to an item in the References section. Be sure to use APA-style.

As much as possible, avoid direct quotations. Only use
direct quotations when necessary. For example, “…as Bill Gates once famously
said, ‘No one will ever need more than 640K of memory’….” Since the writer is
stating a specific (and silly) idea expressed by a well-known person, this
little direct quotation is appropriate. But longer “cut-and-paste” sections are
almost always unnecessary in this project, and most instructors don’t feel
comfortable giving you a grade for a paper that was, to any significant extent,
written by someone else. Usually a paper that contains more than 15-20% direct
quotations is considered unacceptable. Some instructors think even this is way
too high. When in doubt, contact the instructor. In any case, if you use a lot
of direct quotations, expect to receive a poor grade and, if you use ANY direct
quotation, be sure to use quotation marks and an in-text citation. If you
don’t, you risk disciplinary action for violation of the academic integrity
policy. See the course syllabus for more details.

Of all these tips, probably the most important are: start
early and ask questions. Your instructor is committed to helping you get the
most out of the course. If you start early, you’ll be able to ask questions
that will save you time and effort. If you wait until the last minute, you’ll
be stressed and won’t have time to incorporate feedback from your instructor.

Dot Image

Order Solution Now

Similar Posts