Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Subject : Information Security Analysis & Audit (Each Question 10 Marks) Pls ans all the question Q1) In what way firewall provides security and how

Subject : Information Security Analysis & Audit (Each Question 10 Marks) Pls ans all the question

Q1) In what way firewall provides security and how far it works to different intruders and attackers? Explain the technical details of the firewall and describe the need for a firewall in VPN along with its types.

Q2) Cybercriminals who try to steal data and disrupt organizations look for the same systems that were under attack earlier. Do these organizations have enough and the right tools to uncover hidden threats? Explain any five system security tools that are widely used to protect the system.

Q3) Briefly explain the best practices that apply for any data backup. Highlight the common data backup solutions and storage considerations

Q4) An employee at a regional grocery retailer received an email from his co-worker, informing him that she was sharing a document with him. He had received documents from her before but wasn't expecting one that day. The email was vague and had no project details, which was unusual. He clicked the link, and it opened to what looked like the usual file-sharing site the company typically uses. He was asked to enter his login and password, then got an error message. He tried again and got another error message. The employee contacted his manager to request a password reset and report trouble downloading a shared document. He also mentioned that he called the co-worker, and she said she had not sent him anything. The manager was suspicious that this was likely a hacking incident. How does the manager assess or manage the incident and list the comprehensive plans, updates, or changes required in the working environment?

Q5) On a Tuesday morning, a new worm is released; it spreads itself through removable media, and it can copy itself to open Windows shares. When the worm infects a host, it installs a DDoS agent. The organization has already incurred widespread infections before antivirus signatures become available several hours after the worm started to spread. a) How would the incident response team keep the organization's users informed about the status of the incident? b) What additional measures would the team perform for hosts that are not currently connected to the network?

Q6) Audit planning covers all the major areas. The term audit is mainly coined to mirror the incidence of checking financial records of a business or individuals for accuracy. Discuss the activities that need to be reviewed and finalized before the actual audit.

Q7) Discuss how to develop and maintain professional relationships with others. How do you deal constructively with any conflict that may arise with colleagues?

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Practical Database Programming With Visual Basic.NET

Authors: Ying Bai

1st Edition

0521712351, 978-0521712354

More Books

Students also viewed these Databases questions