Question

In: Computer Science

You have recently joined Star Technical Solutions as an information security officer. The company has been...

You have recently joined Star Technical Solutions as an information security officer.
The company has been using SSL in a business-to-business environment for a
number of years. Despite the fact that there have been no compromises in security,
you want to use another protocol which offers stronger security than SSL. Which
protocol is similar to SSL but offers stronger security? Justify your answer by
comparing the features of SSL and your proposed protocol in a tabular form.

b) One of your friends is concerned that attackers could be exploiting a vulnerability in
software to gain access to resources that the user normally would be restricted from
accessing. In this regard he/she has asked for your help. Identify the type of attack
for which your friend is worried and propose a solution.

Solutions

Expert Solution

The Answer is TLS(Transport Layer Security), the protocol which is similar to SSL but provides more security.

SSL

TLS

Secure Socket Layer

Transport Layer Security.

Used in the verification of complex certificates.

Used in the verification of simple certificates.

Ad hoe Message Authentication.

Standard message Authentication.

SSL is less secured as compared to TLS.

TLS is more secure as compared to SSL. But still, it is vulnerable to attacks like BEAST and POODLE.

It has no certificate Alert Message.

It replaces the alert message with several other alert messages.

b) Privilege Escalation is the type of attack where attackers may exploit the vulnerability in the software in order to gain access to resources that the user is often denied access to.

Remedial solutions are as follows:

i) Try to use different and secure passwords and change them from time to time to avoid hacking or attacks.

ii) Maintain two-factor authentication especially using sensitive data in software.

iii) Store sensitive data on the server-side rather than on the client-side.

iv) Keep the plan in tracts or updated.

v) Encrypt the information to be sent to the server-side and secure it with a digital signature.

THUMBS UP IF YOU LIKE IT !


Related Solutions

You have recently joined Star Technical Solutions as an information security officer. The company has been...
You have recently joined Star Technical Solutions as an information security officer. The company has been using SSL in a business-to-business environment for a number of years. Despite the fact that there have been no compromises in security, you want to use another protocol which offers stronger security than SSL. Which protocol is similar to SSL but offers stronger security? Justify your answer by comparing the features of SSL and your proposed protocol in a tabular form.
You have recently joined Royal Security Services as an information security intern. Your supervisor has asked...
You have recently joined Royal Security Services as an information security intern. Your supervisor has asked you to research two network firewalls. In this regard, you have to create a table by comparing features of firewalls in terms of filtering methods (stateless or stateful filtering), additional features these firewalls support (IDS, content filtering, etc.), and the cost of each firewall. Which one you would recommend to your supervisor? Justify your answer. please give answer in tabular form
You have been employed by Challenger Constructions as their first Chief Information Security Officer (CISO). You...
You have been employed by Challenger Constructions as their first Chief Information Security Officer (CISO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources. You are concerned that the company has no existing contingency plans in case of a disaster. The Board indicated that some of their basic requirements for contingency planning include: A Recovery Time Objective (RTO) of 4 hours A...
You have been employed by Challenger Constructions as their first Chief Information Security Officer (CISO). You...
You have been employed by Challenger Constructions as their first Chief Information Security Officer (CISO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources. You are concerned that the company has no existing contingency plans in case of a disaster. The Board indicated that some of their basic requirements for contingency planning include: A Recovery Time Objective (RTO) of 4 hours A...
You have recently been appointed the Chief Financial Officer of Big Dreams Limited, a company in...
You have recently been appointed the Chief Financial Officer of Big Dreams Limited, a company in the fast moving consumer goods industry. The shareholders of the company at their Annual General Meeting approved an ambitious major expansion project that will enable the company to gain market share. You as the CFO has been tasked with preparing a report for the company’s board of directors clearly evaluating the available financing options
You have recently been appointed the Chief Financial Officer of Big Dreams Limited, a company in...
You have recently been appointed the Chief Financial Officer of Big Dreams Limited, a company in the fast moving consumer goods industry. The shareholders of the company at their Annual General Meeting approved an ambitious major expansion project that will enable the company to gain market share. You as the CFO has been tasked with preparing a report for the company’s board of directors clearly evaluating the available financing options.
You have recently been appointed the Chief Financial Officer of Big Dreams Limited, a company in...
You have recently been appointed the Chief Financial Officer of Big Dreams Limited, a company in the fast moving consumer goods industry. The shareholders of the company at their Annual General Meeting approved an ambitious major expansion project that will enable the company to gain market share. You as the CFO has been tasked with preparing a report for the company’s board of directors clearly evaluating the available financing options.
You have joined a company as a security consultant, discuss the vulnerabilities of the company’s data...
You have joined a company as a security consultant, discuss the vulnerabilities of the company’s data and systems and propose a plan to protect company assets.
You have joined a company as a network security analyst. Your CTO came to know you...
You have joined a company as a network security analyst. Your CTO came to know you are a graduate from MIT Melbourne/Sydney and successfully completed a VPN unit. Therefore, you have been asked to develop a security plan for your customers and remote managers for their Internet access to the business. You need to analyse the following cases and recommend the solutions for the question quen-1) You want to assist customers in building trust with your company. Discuss with your...
issue in financial accounting You have been recently appointed as a lending officer in a large...
issue in financial accounting You have been recently appointed as a lending officer in a large bank. The bank is concerned about lending in the current economic environment, where there has been an economic downturn. Prepare a report outlining what agency problems the bank should be concerned with and how debt covenants in debt agreements can be used to reduce those problems. Also explain how accounting numbers can be used to assist in the process? Using the reference materials available...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT