Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1.Describe and discuss the benefits and drawbacks of environmental design. Consider this content too: http://www.wisegeek.org/what-is-environmental-design.htm 2.Briefly define and discuss cyber terrorism and cyber warfare. Be

1.Describe and discuss the benefits and drawbacks of environmental design.

Consider this content too: http://www.wisegeek.org/what-is-environmental-design.htm

2.Briefly define and discuss cyber terrorism and cyber warfare. Be sure to include the length of time that these tools have been used, describe some defensive and offensive capabilites.

A company has a moral obligation to protect its information. One of my projects during the completion of my MIS consisted of conducting an external security test of the company that I worked for. The company MIS director gave formal approval for the sweep and received the test plan to include date, time, and extent of the effort. He received the report of the tools and findings. He felt pretty sure that the company was fairly tight and that it had no weaknesses.

Wrong!

I found that sloppy IT practices had resulted in open ports and exploitable entry points.

Regarding experience with actual cyber warfare -

I was working when some of the folks that attended a trade show brought back free USB drives. Those drives fed a virus into one of our networks that spread across the US from coast to coast. It really irritated a bunch of people and no one was allowed to bring USB drives into work for quite a while.

I was also working when the security dongles used for VPN were penetrated. That company had to call them all back and do some serious modifications as part of the repair. The inability to use remote VPN cramped communication for a while.

3.Explain why an organization might want to use filtering software problems that may arise due to using it. How might one correct those weaknesses?

Some years ago I designed a web site as part of a MS school project.

When I asked some of my co-workers to log in and test it they found that the site host had been filtered by our IT!

No one would explain the reason for that filter. We heard in a round about fashion it might have been blocked due to someone using that site to host a porn site.

My site was a prototype for an Online tutoring service but IT said NO USE SITE and no it was.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Asymmetric Cost Behavior Implications For The Credit And Financial Risk Of A Firm

Authors: Kristina Reimer

1st Edition

3658228210, 9783658228217

More Books

Students also viewed these Accounting questions

Question

What is the purpose of a retaining wall, and how is it designed?

Answered: 1 week ago

Question

How do you determine the load-bearing capacity of a soil?

Answered: 1 week ago

Question

what is Edward Lemieux effect / Anomeric effect ?

Answered: 1 week ago

Question

Define Management by exception

Answered: 1 week ago