Question

In: Computer Science

Consider a company that has an intrusion detection system in half of its systems (50%), has...

Consider a company that has an intrusion detection system in half of its systems (50%), has bring your own device (BYOD) for 30% of its employees, and uses three systems (computers 40%, smartphones 25%, and cloud 35%).

The probability of a breach is 11%.

The probability of a breach given there is an intrusion detection is 15%

The probability of a breach given there is no intrusion detection 25%

The probability of a breach given employees’ use their own devices 43%

The probability of a breach given employees use company devices 13%

The probability of a breach given computer systems is 7%

The probability of a breach given smartphone systems is 27%

The probability of a breach given cloud system is 17%

3.a. What is the probability of a breach of company computer systems that have no intrusion detection?

3.b. What are the conditions that result in the highest risk of an attack?

Solutions

Expert Solution

1) The probability of a breach given employees use company devices 13% or 13\100

The probability of a breach given computer systems is 7% or 7\100

The probability of a breach given there is no intrusion detection 25% or 25\100

Therefore we can say that probability of a breach of company computer systems that have no intrusion detection= 13\100* 7\100*25\100

=2275\1000000

=91\40000

2) Conditions that result in the highest risk of an attack are:-

  • Using personal device
  • Using public network.
  • Clicking on any unauthenticated url.
  • Sharing any personal details
  • Downloading software from an unauthenticated site.

Common types of cyber attacks:

  • Malware

    Malware is a term used to describe malicious software, including spyware, ransomware, viruses, and worms. Malware breaches a network through a vulnerability, typically when a user clicks a dangerous link or email attachment that then installs risky software.

  • Phishing

    Phishing is the practice of sending fraudulent communications that appear to come from a reputable source, usually through email. The goal is to steal sensitive data like credit card and login information or to install malware on the victim’s machine

  • Man-in-the-middle attack

    Man-in-the-middle (MitM) attacks, also known as eavesdropping attacks, occur when attackers insert themselves into a two-party transaction. Once the attackers interrupt the traffic, they can filter and steal data.

  • Denial-of-service attack

    A denial-of-service attack floods systems, servers, or networks with traffic to exhaust resources and bandwidth. As a result, the system is unable to fulfill legitimate requests. Attackers can also use multiple compromised devices to launch this attack. This is known as a distributed-denial-of-service (DDoS) attack.


Related Solutions

An intrusion detection system (IDS) is a device or software application that monitors network or system...
An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station
Please explain as much as possible. 1. Demonstrate an understanding of how Intrusion Detection Systems and...
Please explain as much as possible. 1. Demonstrate an understanding of how Intrusion Detection Systems and protocol analyzers work. 2. Demonstrate an understanding of how to use event logs, session data, and network communication to find and remediate network intrusions 3. Demonstrate understanding of network security monitoring and incident response
1- Identify and describe the categories and models of intrusion detection and prevention systems. 2- Define...
1- Identify and describe the categories and models of intrusion detection and prevention systems. 2- Define and describe honeypots, honeynets,and padded cell systems.
consider a scenario where a company has to automate its systems and wants to store the...
consider a scenario where a company has to automate its systems and wants to store the details of its employees with their empno, name, emailid, salary, DoB ,age ,gender,and address to be stored .Emailid is the primary key. every employee works on multiple projects (pno ,pname, ) and one project may involve many employees who belong to various departments ( dname,loc ) . each employee many have dependents ( depno, depname,relationship) . the depno ia unique among the dependants of...
Software Inc. is considering a replacement of its air conditioner system. The company has two systems...
Software Inc. is considering a replacement of its air conditioner system. The company has two systems to choose: -   Matsu-Cool models cost $40,000 to purchase, result in electricity bills of $15,000 per year, and last for 5 years. -   Tuba-Air models cost $60,000 to purchase, result in electricity bills of $10,000 per year, and last for 7 years. Both systems are fully depreciated straight line. Assume that the company will replace the air conditioner when it wears out. The tax...
Compare/Contrast the Main Olfactory System to the Accessory Olfactory System from detection to perception and consider...
Compare/Contrast the Main Olfactory System to the Accessory Olfactory System from detection to perception and consider how they work separately and together
this question related for system engineering Describe for saudi aramco company total system and its sub-systems....
this question related for system engineering Describe for saudi aramco company total system and its sub-systems. Does the company goals are in alignment with other systems/subsystems?
Describe for saudi aramco company total system and its sub-systems. Does the company goals are in...
Describe for saudi aramco company total system and its sub-systems. Does the company goals are in alignment with other systems/subsystems?
Consider the following two half-cells. One half-cell (half-cell A) initially has 1.0 M each of 3PG...
Consider the following two half-cells. One half-cell (half-cell A) initially has 1.0 M each of 3PG and GAP; the other half-cell (half-cell B) initially has 1 M each of NAD+ and NADH. What is the value of ΔG°’ (in kcal/mol to the nearest tenths) when the two half-cells are connected by a salt bridge. To answer this question, you will need the standard reduction potential of NAD+ (which is given in your text), and you will need the standard reduction...
XYZ Company has a current market value of $1 million, half of which is debt. Its...
XYZ Company has a current market value of $1 million, half of which is debt. Its current WACC is 9%, and the tax rate is 40%. The firm is considering a new project which costs $500,000 that will be financed completely with debt and has the same operating risk as the firm’s existing projects. Finally, the project is expected to yield an after-tax rate of return of 8.5% per year. What is the appropriate cost of capital to use in...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT