Question

In: Computer Science

Consider the following scenario: In this assignment, you will consider the need for security controls to...

Consider the following scenario: In this assignment, you will consider the need for security controls to protect the availability, confidentiality, and integrity of electronic data. Continuing with the scenario from Week 2 Discussion, every registered user of Paul Gray's online share trading company is required to read the safety and privacy page of the portal. As a secure portal, it has Secure Socket Layer (SSL) as a security measure. Gray has asked you to help him with this aspect of security as well. As many of Gray's clients would also like to know about tax saving measures when they trade, Gray has hired Steve Davis as a tax consultant. Davis works from home and travels to his clients all over the country. Occasionally, he visits client sites, and takes his laptop with him on all such trips. Gray has asked for recommendations on his current system and for Davis and his setup.

Answer the following questions: On Gray’s portal, what security measures in addition to SSL can be deployed to ensure the privacy of users in an online environment? Provide at least two security measures and explain why they would be beneficial. What benefit does each provide to the user? How can the user be sure it is working properly?

For Davis, which top two security measures should he take to ensure that his data and the connection to Gray's network are best protected against attack? Describe the security provided by each measure and explain why it is important. Defend your choice of measures in the discussions that follow. Are these two measures sufficient to call the laptop secure? Why or why not? If not, what aspect of security is still missing?

Solutions

Expert Solution

On Gray's portal the security measures along with SSL are as follow:

Data encryption, data integrity checks to be made and client authentications.. Use of PGP (Pretty good privacy) is an additional security encrypting messages and attachments.

The security measures should be to use encryption technique as it would help to prevent the confidential information from getting leaked.

The other being use of client authentication before accessing any stuff.

Several checks and testing needs to be done before the complete execution of the product as the user uses it.

For davis a secure connection with Gray's network with antivirus installed and also with the authentication which would be known to the parties responsible is needed.

The security measures are with respect to control and configuration . The other being with respect to privacy and protection of data's. Yes the above measures are secure enough for the laptop to be secure.


Related Solutions

This assignment asks you to consider a negotiation scenario with family members. Consider this scenario: You...
This assignment asks you to consider a negotiation scenario with family members. Consider this scenario: You and your brother work for your father’s successful family business, which employs 15 individuals. Your role has evolved from being the Chief Machinist to being the General Manager and main salesperson for the business. Your brother has creative talent and is good at designing and fabrication, but is not strong in interpersonal skills. Additionally, your brother does not take care of his personal appearance...
I am creating a system for a security design and need to choose controls for network...
I am creating a system for a security design and need to choose controls for network security and those with access controls as well. I need to decide what major network security controls I would need to recommend. Which ones are good examples and why? Within that, I need to describe three access control techs. and their essentials for util. apps. Are there a few cases to assist in demonstrating those access control techs.
The following returns have been estimated for Security T and Security S: Scenario Security T Security...
The following returns have been estimated for Security T and Security S: Scenario Security T Security S 1 20% 10% 2 13% -6% 3 15% 20% Each scenario is equally likely to occur, and you plan to invest 70% in Security T and 30% in Security S. What is the standard deviation of the rate of return of the portfolio? Round your answer to the nearest tenth of a percent. A) 0.0% B) 4.5% C) 19.9% D) 59.7%
The following returns have been estimated for Security T and Security S: Scenario Security T Security...
The following returns have been estimated for Security T and Security S: Scenario Security T Security S 1 20% 10% 2 13% -6% 3 15% 20% Each scenario is equally likely to occur, and you plan to invest 70% in Security T and 30% in Security S. What is the standard deviation of the rate of return of the portfolio? Round your answer to the nearest tenth of a percent. A) 0.0% B) 4.5% C) 19.9% D) 59.7%
The following returns have been estimated for Security T and Security S: Scenario Security T Security...
The following returns have been estimated for Security T and Security S: Scenario Security T Security S 1 20% 10% 2 13% -6% 3 15% 20% Each scenario is equally likely to occur, and you plan to invest 70% in Security T and 30% in Security S. What is the standard deviation of the rate of return of the portfolio? Round your answer to the nearest tenth of a percent. A) 0.0% B) 4.5% C) 19.9% D) 59.7%
Would an organization need to apply security controls to allow safe use of those applications? Why...
Would an organization need to apply security controls to allow safe use of those applications? Why or why not?
Research and include the following: Security Risk Mitigation Plan: Select and document security policies and controls.
Security Mitigation Plan discuss the following Research and include the following: Security Risk Mitigation Plan: Select and document security policies and controls. Create password policies. Document administrator roles and responsibilities. Document user roles and responsibilities. Determine authentication strategy. Determine intrusion detection and monitoring strategy. Determine virus detection strategies and protection. Create auditing policies and procedures. Develop education plan for employees on security protocols and appropriate use. Provide risk response. Avoidance Transference Mitigation Acceptance Address change Management/Version Control. Outline acceptable use of organizational assets and data. Present employee policies (separation of duties/training). Explain incident response. Incident types/category definitions Roles and responsibilities Reporting requirements/escalation Cyber-incident response...
Research and include the following: Security Risk Mitigation Plan: Select and document security policies and controls....
Research and include the following: Security Risk Mitigation Plan: Select and document security policies and controls. Create password policies. Document administrator roles and responsibilities. Document user roles and responsibilities. Determine an authentication strategy. Determine an intrusion detection and monitoring strategy. Determine virus detection strategies and protection. Create auditing policies and procedures.
For this Assignment you will need to define the following sectors and describe the role that...
For this Assignment you will need to define the following sectors and describe the role that they play: (The Private Sector) Business (The Nonprofit Sector) Charities & Foundations (The Public Sector) Government You should utilize additional resources. Please submit a minimum of 100 words per item, and remember to cite your sources.
For this writing task, you'll need to respond to the following scenario: Who are you? You...
For this writing task, you'll need to respond to the following scenario: Who are you? You work as department head in the information technology (IT) department at First Federal Bank. Part of your job is to conduct an ongoing assessment of risk for the institution and to recommend proper controls. Banking systems should be able to quickly collect and edit information, summarize results, and promptly correct any errors. You have identified a possible threat to "timeliness" of information. You have...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT