Question

In: Computer Science

Question 1: You are working in a university as an IT specialist, and due to the...

Question 1: You are working in a university as an IT specialist, and due to the pandemic, the university has decided to allow its employees to work from home. Your line manager has asked you to develop a security proposal that allows the university employees to work from home in a secure manner while using the public cloud/Internet. In this context, answer the following: a. What could go wrong if the university allows its lecturers to access student records from home using conventional, non-secure means? Discuss under the ambit of the three aims of security? b. What secure solution would you propose to your line manager? Define what it is along with its advantages directly in relation to the issues identified above. c. What additional training will your proposed solution require from an end-user perspective?

Solutions

Expert Solution

1. A) A non-secured communication between two channels may affect the data we transfer. That is the data transfer from one end to another end do not have any security mechanisms between them.

Here the lecturers are using their student data in a conventional and non-secure manner.

A conventional data communication means it is basically using a wired communication. That is the data transfer is carried between wires. The main advantage of this system is, it is easy to install and fix. But the devices are immobile. So, we cannot easily move the network as we wish. The speed and security of data may be compromised in the conventional data communication.

So, a non-secured and conventional communication have:

1. Less speed of data

2. Less security

3. Quality of Service is less

4. Easy to install and fix

5. The devices are immobile.

6. Costly.

7. Losses are high

8. Bandwidth are low.

The unsecured communication we mainly seen on the web browser. That is, while using a web browser. It shows like http and https. The http is hyper text transfer protocol and https is hyper text transfer protocol secured. Basically, these two are used for transferring data from the source to the destination. And the difference between them is https is secured connection.

A security of data can be assured in many ways. Which are

1. Hiding the content.

That is while communicating the data may be hide from the source and it can be revealed at the destination only. So, the intermediators or the interceptors cannot access the data.

We can apply some methods to access the data hiding. They are:

1. Code

2. Encryption.

3. Obfuscation

4. Steganography.

5. Identity based.

2. Hiding the parties.

That is no one can identify the source and the destination of data.

1. Crowds

2. Anonymous communication devices.

3. Anonymous proxies.

3. Hiding the fact that communication takes place.

1. Random Traffic

2. Security by obscurity.

b) secured solution

For securing the communication, we can use some security tools.

1. Encryption.

The data can be encrypted from the source side and decrypted by the destination side. So, the unauthorized users cannot access the data.

2. Steganography.

Steganography is the hidden writing. That is data can be hidden within other more innocuous data.

3. Identity based network.

Unwanted or malicious behaviour is possible on the web since the internet is inherently anonymous.

4. Anonymized networks.

Anonymous networking has been used to secure communication.

5. Anonymous Communication Devices.

So, the anonymous communication device may a threat.

These precautionary measures may be protect the data which are accessed by the employees to their students.

C) And in terms of end-user perspective the data may get secured otherwise it get accessed by the unauthorised user. And it may lead to data loss. So, they need an additional training to the employee who can always part of the student data.

The training may get

Data security

Integrity

And Confidentiality.

These factors may secure the data communication more effective.


Related Solutions

You are a Contract Specialist working for the Department of Defense. You have been given the...
You are a Contract Specialist working for the Department of Defense. You have been given the task of performing a should cost analysis on a proposal that is 50% below the Independent Government Cost Estimate (IGCE). Discuss the steps that you would take to perform the cost realism analysis. What sources of information could you utilize in performing the analysis?
You are working for Mindak LLP, an accounting consulting firm, as a research and accounting specialist....
You are working for Mindak LLP, an accounting consulting firm, as a research and accounting specialist. Rowling Inc., an important manufacturing client, has asked you to research and explain the accounting rules for property, plant and equipment issues that the company is experiencing. The client wants you to reference and briefly explain the GAAP rules provided in the FASB codification. Rowling Inc. will then use your business professional memo to look up the rules in the codification. Instructions: Research the...
You are working for Mindak LLP, an accounting consulting firm, as a research and accounting specialist.  Rowling...
You are working for Mindak LLP, an accounting consulting firm, as a research and accounting specialist.  Rowling Inc., an important manufacturing client, has asked you to research and explain the accounting rules for property, plant and equipment issues that the company is experiencing.  The client wants you to reference and briefly explain the GAAP rules provided in the FASB codification. Rowling Inc. will then use your business professional memo to look up the rules in the codification. (a) the capitalization period for...
You are a wireless communication specialist working with an ambitious exploratory firm named PROJECT-SPACE. The firm...
You are a wireless communication specialist working with an ambitious exploratory firm named PROJECT-SPACE. The firm is embarking on a huge project to build a human habitat in planet Mars. In 25 years, PROJECT-SPACE projected that the human habitat will gradually evolved into a small space city with the population of 1000 occupants. The initial habitat should be able to accommodate 15 Martians with consistent, stable and reliable communication from Mars to the planet Earth command center back in the...
Question 1. Suppose you are working as a consultant for a firm that is a monopoly...
Question 1. Suppose you are working as a consultant for a firm that is a monopoly and is worried about its policies in the short run. What would you recommend in terms of quantity changes (raise, cut, shut down or stay put) and price changes (raise, cut, stay put) in each of the following situations a through c: a. [5 points] P = $299 MC = $349 AVC = $249 b. [5 points] MR = $150 MC = $100 AVC...
(1) Pre Lab Question: You are working in the lab and are told to create an...
(1) Pre Lab Question: You are working in the lab and are told to create an artificial membrane from phospholipids. You are then instructed to add certain solutes to the membrane to see if it works appropriately. Rank the permeability for the following across a phospholipid membrane for the following: lysine, urea, sodium ion, insulin, water, indole
You recently started working in at a University in the Math department as a software programmer....
You recently started working in at a University in the Math department as a software programmer. You need to build an app that can calculate the mod of two numbers. Users need to enter num1 and num2. The app should perform the calculation and display the output as num1 mod nub2 operation. For example, 25 mod 5=0 24 mod 5 = 4 Once you implement the mod operations, then you need to add following buttons. Addition Subtraction Division Power Follow...
Question 1. A soil management specialist was studying the relationship between the average temperature (in ºC)...
Question 1. A soil management specialist was studying the relationship between the average temperature (in ºC) and the yield in bushels per acre for a certain crop. The data is given in Table 1 below. Table 1 Region Temperature Yield (in ºC) (in bushels per acre) X Y 1 4 1 2 8 9 3 10 7 4 9 11 5 11 13 6 6 7 Construct a scatter a scatter diagram for the paired data. As temperature increases, does...
You are a database designer and data analyst working for the hypothetical employer, Park University. The...
You are a database designer and data analyst working for the hypothetical employer, Park University. The University over the last few years has provided faculty and staff needed technology to support various job functions but is having some trouble tracking such technology to ensure the program is cost-effective.   In other words, the University Controls Department is having difficulty locating inventories and associated invoicing information. With the lack of this important information, the University Controls department has a very difficult time...
Question 1 (1 point) Saved Imagine that you are working with DNA sequences of soluble proteins...
Question 1 (1 point) Saved Imagine that you are working with DNA sequences of soluble proteins (not membrane proteins) and have the technology to genetically engineer/alter the existing sequence and you can express this particular protein in a yeast cell model. You also have the power to track and visualize where the genetically engineered proteins traffic in your model system.   You engineer an ER signal sequence to the amino-terminal end of a normally cytosolic protein.    Which best describes the fate...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT