Question

In: Computer Science

a) Examine the three elements of Cyber Security that are generally used to protect computer networks and systems.


a) Examine the three elements of Cyber Security that are generally used to protect computer networks and systems.  

b) An ethical dilemma is a situation a person faces in which a decision must be made about appropriate behavior. Discuss any five key professional ethical values to be considered when faced with ethical dilemma at the work place. 

c) Jeremy Bentham (1748-1832) once said “The greatest goal is to achieve the greatest happiness for as many people as possible.” Clearly explain what he meant by such a statement. 

Solutions

Expert Solution

a. Cyber Security is the protection of internet systems, including hardware, software, and data from cyberattacks. the elements of cybersecurity which is used to protect networks and systems:

  • Application Security - Application Security is the process of protecting a website and many other online services against different security threats common targets for web application attacks are content management systems like WordPress, database administration tools like PHP, MyAdmin, and different kind of software as the service applications. the application can be targeted by coding practices, if the code is poorly written hackers can exploit application layer loopholes to initial attack suppose if the code is complex it increases the likelihood of unattended vulnerabilities and malicious code manipulation secondly ease of execution most attacks can be easily automated and launched indiscriminately against thousands or even tens or hundreds of thousands of targets at the same time and lastly the most popular reason is big as people get paid in bulk to launch an attack on applications.

    Organization failing to secure their web applications run the risk of being attacked and this is mostly due to vulnerabilities that are present in the application and this gives leave it for attackers to manipulate web applications, let's consider the common type of attacks:
    • SQL Injection - perpetrator uses malicious SQL code to manipulate a back-end database so that he can get his hands on sensitive information.
    • Cross-site Scripting - this usually occurs when an attacker injects malicious code directly into an application this way can get access to accounts activate trojans or modify page content without users' content.
    • Remote File Inclusion - a hacker injects a file onto a web application server by doing so can easily execute malicious scripts or code within the application as well as steal data and manipulate it without knowing about it.
    • Cross-site request forgery - it is caused when a malicious web application makes the user's browser perform an unwanted action in a site to which is currently logged into most of the time organizations have certain countermeasures to ensure safety against these attacks.
  • Information Security - Information and data are exchange by people processes and systems. daily processes are virtually impossible to carry out without the processing of data and information, the information security ensures that people deal with the reliable information and data regarding confidentiality integrity and availability and is an important prerequisite in the pursuit of a better and above all more reliable service offering failure of computer systems database is falling into the wrong hands or the abuse of confidential information can have serious consequences for organizations businesses and citizens these include loss of image compensation claims and even political consequences an information security management system. the key concepts of information security such as:
    • Confidentiality - Information is accessible only to those who are authorized to view it.
    • Integrity - Information especially while being communicated, is protected against unauthorized modification
    • Availability - Information is invulnerable to attacks or is recoverable in a secured way that is it is available only to authorized when it should be.
    • Non-Repudiation - Sender to information can not deny the information has not been sent by him.
  • Network Security - The network security consists of policies and practices adopted to prevent and monitor unauthorized access misuse modification or denial of a computer network and network-accessible resources only network security can protect from Trojan horse viruses, network security involves the authorization of access to data in the network which is controlled by the network administrator users choose or are assigned an ID and password or other authenticating information that allows them to access to information and programs within their authority network security coverage transactions and communications among businesses government agencies and individuals too. networks can be private such as within the company and others which might be open to public access and network security is involved in organizations and prizes and other types of institutions it does as a title explains it secures the network as well as protecting and overseeing operations being done and the most common and simple way of a network resource is by assigning it unique name and a corresponding password.

b. Five key professional ethical values -

  • Confidentiality - it is the duty to keep secret all information deemed desirable to keep secret. deemed by whom? basically, it is any information that the employer or client would like to have kept secret to complete effectively against business rivals. often this is understood to be any data concerning the company's business or technical processes that are not already public knowledge. But more appropriately it points to the employer or a client as the main source of decision as to what information is to be treated as confidential. the primary justification is to respect the autonomy of individuals and corporations and to recognize their legitimate control over some private information concerning themselves. all the major ethical theories recognize the importance of the company, additional justification includes trustworthiness, there are public benefits in recognition of confidential relationships within professional contexts.
  • Loyalty - The feeling to support or duty towards someone or something. it obligates the members of the organization to be supporters of its goal and policies.
  • Transparency - Transparency implies openness, communication, and accountability which ultimately help in building trust and integrity. it refers to the quality of something being done in an open way without secrets. An organization is said to be transparent of working in open to public and media scrutiny and public discussion. generally, it is characterized by visibility or accessibility of information especially concerning business and financial activities, so that people can trust that they are fair and honest. transparency is governance broadly refers to the availability of information to the general public and clarity about the functioning of government institutions. it also implies that taking decisions and implementing them is done in a manner that follows rules and regulations. it also means that information is freely available and directly accessible to those who will be affected by such decisions and their enforcement.
  • Trustworthiness - the trust can be more important than right now we earn and destroy trust every single day through our actions and through our behaviors with our relationships with our employees, teams, vendors, consumers, government officials, and medical officials to give us the information resources that needs, trust is key and critical in business and leadership.
  • Accountability - it means an obligation or willingness to accept responsibility or to account for one's actions. in other words, accountability of the exercise of the power of discretion vested in some authority to which it is due, failing which, some kind of punishment may follow. it is a simple term that is answerable for one's action or behavior. the core values involved in the question of accountability are democracy, efficiency, and ethics.

c. if everyone can be made happy, as much as better, but if a choice is necessary, it is always preferable to favor the many over the few. happiness or pleasure is that which is of the highest support importance n life pleasure is that makes our lives valuable. In every person have a specific goal in their life like students want to achieve good score in academic, employer want to achieve good promotion in their job circumstances so if they achieve on there means that will be them greatest happiness which will not get from other people getting from them gifts or anything which is realted to them.


Related Solutions

Application security is one of the primary avenues used by attackers to penetrate systems and networks....
Application security is one of the primary avenues used by attackers to penetrate systems and networks. Some of these avenues still being exploited have been known for decades. There has historically been a wide gap between application developers and security professionals—a gap that more organizations are becoming motivated to bridge. Discuss the following: Differentiate between object-based and object-oriented computer code. Identify common avenues of vulnerability specific to application security. Explain strategies that mitigate application security vulnerabilities.
A cyber security engineer is installing a WAF to protect the company's website from malicious web...
A cyber security engineer is installing a WAF to protect the company's website from malicious web requests over SSL. Which of the following is needed to meet the objective? A. A reverse proxy B. A decryption certificate C. A split-tunnel VPN D. Load-balanced servers     A cyber security consultant was asked to revise the security baselines that are utilized by a large organization. Although the company provides different platforms for its staff, including desktops, laptops, and mobile devices, the...
in a short essay, describe chinas cyber security and the technology used.
in a short essay, describe chinas cyber security and the technology used.
What controls must be used to protect data that is transmitted across wireless networks?
What controls must be used to protect data that is transmitted across wireless networks?
Examine the markets elements that are used to promote marketing activities.
Examine the markets elements that are used to promote marketing activities.Details: New Romans characters             Font size 12             Double spacing              Reference
Overview A cyber-security company called UltraHackz is interested in finding talented computer science students. To do...
Overview A cyber-security company called UltraHackz is interested in finding talented computer science students. To do so, they post a challenge you find very interesting. They upload a txt file that contains 100 records containing information about 100 system accounts. Each record has a username, a salt value, and a hashed password. Each record is stored as follows: <username>,<salt value>,<hashed password> That is, there is one line per record in the file, where the three values are separated by commas....
1) Cyber Security Systems had sales of 3,600 units at $70 per unit last year. The...
1) Cyber Security Systems had sales of 3,600 units at $70 per unit last year. The marketing manager projects a 30 percent increase in unit volume sales this year with a 20 percent price increase. Returned merchandise will represent 10 percent of total sales. What is your net dollar sales projection for this year? 2) The Hartnett Corporation manufactures baseball bats with Pudge Rodriguez’s autograph stamped on them. Each bat sells for $37 and has a variable cost of $20....
Based on information from the National Cyber Security Alliance, 93% of computer owners believe that they have antivirus programs installed on
Based on information from the National Cyber Security Alliance, 93% of computer owners believe that they have antivirus programs installed on their computers. In a random sample of 400 scanned computers, it is found that 380 of them (or 95%) actually have antivirus programs. Use the sample data from the scanned computers to test the claim that 93% of computers have antivirus programs.  
What are some physical security design elements for alarm/access control systems servers?
What are some physical security design elements for alarm/access control systems servers?Why is Physical Security design elements for alarm/access control systems/servers so crucial in a data center?
A manufacturer of sprinkler systems used in office buildings to protect against fires claims that its...
A manufacturer of sprinkler systems used in office buildings to protect against fires claims that its sprinklers are activated at a temperature of 130°F. The sample of 9 systems recorded the temperature at the time of activation of the system. Temperature 133.90 132.15 130.23 129.23 133.45 131.94 130.18 130.82 129.77 Summary Statistics Mean: 131.29667 Std Dev: 1.6496212 Std. Err Mean: 05498737 N:9 a) Construct a 99% confidence interval for the mean temperature at activation. What does this interval mean? b)...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT