Entries by Student

write my assignment 30590

1. What is the overall objective of an IT risk assessment ?

a) To assist IT management in establishing a budget for countermeasures

b) To assist an organization in identifying risks and impacts

c) To convince the executive management on the importance of an Intrusion Detection System (IDF)

d) To determine which brand of firewall software to install on the CEO’s laptop when traveling

2. Why is it difficult to conduct a quantitative risk assessment for an IT infrastructure ?

a) It is difficult to setup the rules in a firewall based on quantitative statistics and numbers

b) A quantitative analysis is subjective and is based on the opinions of experts which is time consuming to collect

c) A quantitative analysis requires IBM’s SPSS statistical software which is $2500 per copy and is too expensive

d) Obtaining the correct information on liabilities and collecting accurate data cost elements is difficult and time consuming

3. What would be a valid reason to assign a “1 – CRITICAL” risk factor to a found vulnerability?

a) It was determined that the vulnerability could cause employees to open emails with a possible virus.

b) It was determined that the vulnerability could impact the time it would take to stock incoming parts in the warehouse.

c) It was determined that the vulnerability could be the greatest risk to the organization

d) It was determined that the vulnerability could close the factory for a couple of hours.

4. Three vulnerabilities were determined for an organization:

Employee Productivity

Compliance shortcomings

Vulnerability in protecting Intellectual Property

You are about to assign Risk factors “1” , “2” , and “3” to these vulnerabilities to present to management. How would you prioritize these risks ?

a) 1- Keeping Employee Productivity up is the most serious risk, then 2-Compliance, then 3- Intellectual Property

b) 1- Protecting Intellectual Property is the most serious risk, then 2-Employee Productivity, then 3- Compliance

c) 1-Compliance is the most serious risk, then 2-Intellectual Property, then 3-Employee Productivity

d) All three are equally important and should have equal rating factors.

5) A married man gets a new job in a company. After three months, he meets a younger woman in the finance department and they begin having an affair. The affair carries on openly in the workplace over the course of 6 months, then begins to sour when she discovers that he is already married. The relationship quickly changes to bickering and name-calling while at work. The woman eventually breaks off the relationship, quits her job, and sues the company for fostering a hostile work environment. True or False: Of the seven IT infrastructure domains, the USER domain was most at risk.

a) True

b) False

6) A young woman waits in a local deli to hear the coffee order come in by phone from the law firm close by. The law firm places the same order every morning. A delivery boy sets out to deliver the coffee but is met outside by the woman near the front of the firm’s building. The woman smiles and claims she is one of the lawyers; she offers to bring the coffee upstairs for him and gives him a generous $10 tip. The boy shrugs, takes the money, gives her the coffee order, and heads back to the deli.

The woman enters the firm’s lobby and tells the two security guards that she is the delivery girl from the deli and has the coffee order. She chats casually with one guard while she covertly peers over the shoulder of the 2nd guard and watches him enter the security codes to access the elevators on the lobby computer. The first guard takes the coffee and gives her a $2 tip. She gives them a big, friendly smile, says thank you, waves goodbye, and leaves the building.

10 days later she returns to the law firm at night, breaks into the building, accesses the elevators using the lobby computer, and breaks into the offices upstairs to steal vital case information.

Which domain was exploited by the woman perpetrator ?

a) The LAN domain

b) The User domain and the Remote Access domain

c) The Workstation domain

d) The System/Application domain

7) A pharmaceutical sales person has a route of doctor’s offices that he visits to see if they need to replenish any of the drug supplies in the offices. He carries with him a tablet with a cellular data plan from which he can place orders. The transactions are processed in real-time via secure browser over the Internet to access the sales-order entry system. Which of the seven domains would have the primary focus of secure communications?

a) The User domain and Systems/Application domain

b) The WAN domain and the Systems/Application domain

c) The LAN-to-WAN doman

d) The Remote Access domain

8) Which of the threats below is primarily a risk to the Systems/Application domain ?

a) A fire destroys the primary data center

b) There is a major network outage

c) A hacker accesses the internal network from a public Internet cafe.

d) None of the above

9) Which of the following is NOT a LAN-to-WAN domain risk ?

a) VPN tunnel hardware is obsolete and needs upgrading to modern security levels

b) Weak ingress & egress traffic filtering between the internal network and the Internet

c) DDoS attack on DMZ and email server

d) Unauthorized access to business-owned workstations

10) Loss of production data is a Workstation domain risk.

a) True

b) False

11) Network performance that is slowed down by excessive Internet traffic is a top-level (1-rating) critical business risk ?

a) True

b) False

 

"Not answered?"


Get the Answer

write my assignment 12069

“1. Can the nominal interest rate ever be negative? Can the real interest rate ever be negative? Explain.2. What is a sunk cost? Should it be included in the incremental cash flows for a project? Why or why not?3. What is an opportunity cost? Should it be included in the incremental cash flows for a project? Why or why not?4. Briefly describe the four characteristics of IPOs that puzzle financial economists.5. You are purchasing a new home and need to borrow $325,000 from a mortgage lender. The mortgage lender quotes you a rate of 6.5% APR for a 30-year fixed rate mortgage (with payments made at the end of each month). The mortgage lender also tells you that if you are willing to pay 1 point, they can offer you a lower rate of 6.25% APR for a 30-year fixed rate mortgage. One point is equal to 1% of the loan value. So if you take the lower rate and pay the points you will need to borrow an additional $3,250 to cover the points you are paying the lender. Assuming that you do not intend to prepay your mortgage (pay off your mortgage early), are you better off paying the 1 point and borrowing at 6.25% APR or just taking out the loan at 6.5% without any points? Why?

 

"Not answered?"


Get the Answer

write my assignment 17536

Unit VI PowerPoint Presentation

Instructions

Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data. As the manager of the information technology (IT) security department, you were asked by your boss to present a summary of what the organization should do to prevent this from happening again. Create a PowerPoint presentation of your summary. In your PowerPoint presentation, you should include the components listed below.

  • Explain the goal of information security in relation to mobile devices.
  • Identify the three sources of threats, provide a summary of each, and provide at least one example of each.
  • Explain technical safeguards, and discuss which technical safeguard(s) should be used for mobile devices.
  • Explain data safeguards, and discuss which data safeguard(s) should be used in this type of scenario.
  • Explain human safeguards, and discuss which human safeguard(s) should be implemented.
  • Discuss why the organization needs an incident response plan to secure information and knowledge.

Your presentation must be a minimum of six slides in length, not counting the title and reference slides. Be sure that any graphics used are appropriate and support the content of your presentation. You must use at least two references in your presentation, and they should be cited and referenced in APA format. Please cite all sources used.

 

"Not answered?"


Get the Answer

write my assignment 3423

TheWall Street Journal reported that automobile crashes cost the United States $162 billionannually (The Wall Street Journal, March 5, 2008). The average cost per person for crashesin the Tampa, Florida, area was reported to be $1599. Suppose this average cost was basedon a sample of 50 persons who had been involved in car crashes and that the population standarddeviation is σ $600. What is the margin of error for a 95% confidence interval? Whatwould you recommend if the study required a margin of error of $150 or less?

TheWall Street Journal reported that automobile crashes cost the United States $162 billion annually (The Wall Street Journal, March 5, 2008). The average cost per person for crashes in the Tampa,…

 

"Not answered?"


Get the Answer