question archive 1) Look up "the paper that started the study of computer security

1) Look up "the paper that started the study of computer security

Subject:Computer SciencePrice:4.87 Bought7

1) Look up "the paper that started the study of computer security." Prepare a summary of the key points. What in this paper specifically addresses security in previously unexamined areas?

2. Assume that a security model is needed for the protection of information in your class. Using the CNSS model, examine each of the cells and write a brief statement on how you would address the three components of each cell.

3. Using the Web, identify the chief information officer (CIO), chief information security officer (CISO), and systems administrator for your school. Which of these people represents the data owner? Which represents the data custodian?

4. Using the Web, find a large company or government agency that is familiar to you or located in your area. Try to find the name of the chief executive officer (CEO), the CIO, and the CISO. Which was easiest to find? Which was hardest?

5. Using the Web, find out more about Kevin Mitnick. What did he do? Who caught him? Write a short summary of his activities and explain why he is infamous.

6. Using the Web, explore the technique known as "iterative and incremental development." Then, investigate "agile development." How are they related?

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE

Answer Preview

Answer:

Part-1:

1.The study of the computer security key points is summarized:

The computer security goal is used to improve the security and the safety are as follows a s

  • To secure the data is used increases the security of the data in the physical location.
  • To prevent the data from unauthorized access of the data is able to improve the limited access to the unauthorized accounts and the documents.
  • To relate the personnel data through the multiple levels of the organization.

2.The addresses security in the previously unexamined areas:

  • The addresses security is unexamined in previous area are as follows as
  • The dial up has the less security
  • The user identification is non existent
  • The formatting the structure and the password is lacking.

Part-2:

The three components of each cell using the CNSS model:

The three components of each cell using the Committee on National Security System have the three-security model and the goals of the first model is Confidentiality, Integrity, Availability is the first model and the second model is Transmission, Storage and Processing and the third model is Policy, Technology and the Education.

Part-3:

Identify the data owner or data custodian:

  • The chief information officer - Data owner
  • The chief information security officer - Data custodian
  • School administrator- Data custodian

Part - 4:

The large company in Bangalore and the name of the chief executive officer (CEO), the CIO, and the CISO require to know easiest to find CEO or CISO and hardest find:

Company: Infosys

The CEO is  Salil Parekh

The CIO is Rajesh Varrier

The CISO is Vishal Salvi's

CEO is easiest to find and Ciso is hardest to find. 

Part-5:

To know more about the Kevin mitnik:

  • Kevin mitnik is a hacker and an American computer security consultant author and also the CEO of the mitnick security consulting.
  •  Kevin Mitnik is one of the most FBI criminals because of gaining unauthorized access to dozens of computer networks.
  •  So, Kevin Mitnik was caught and arrested in jail because of the rumor of launching the codes of the nuked into the payphone.
  • Kevin Mitnik is hacking the social engineering of the punch system for the busses in order to avoid the system.
  •  Kevin is infamous because of the wire fraud, computer fraud and illegal interrupting communications.

Part-6: 

The Technique known as" iterative and the incremental development", investigate "agile development" and related two techniques: 

1. The iterative and the increment development is defining the developing software in the process development and the system of the iterative end of  the incremental development of the system has smaller portions declared as the increment and the running for each increment by the cycles. 

2.The agile development is defined as the traditional software of the project management and it is used to help in the development of the iterations for all the software life cycles and it easy to find the errors and also to reduce the fault.

 3.The technique of the "iterative and the increment development "and the "agile development" is related to the agile development will followed the iterative model of the model of the software to minimize the models in the risk of the stakeholder fulfilment and the output of the product is the faster delivery. 

Step-by-step explanation

Part-1:

1.The key points of the network security:

The network security of the user or the program will access the network computer is linked towards the network without changing the program and it is also interconnecting the computers to create the techniques and to increase the experience. The network security is increasing the productivity resources through sharing the resources.

2.Unexamined until now for the address security:

To unexamined the address security have less security for the dial up users, to set the password creating is still deficient and not easy to identify the present users.

Part-2:

The CNSS model of three components:

  • Confidentiality: The data information of the class and the student's grade will be in secured manner and the unauthorized users are not able to access the information.
  • Integrity: The data will not be modified unintentionally and the student's data is maintained through integrity.
  • Availability: The students' data will be accessed easily while required.
  • Storage: The students' data will be stored carefully.
  • Transmission: The student corrected data should be received through the end users.
  • Policy: In policy, there is information about the student should be confidential.
  • Education: The training will be provided to all the users and also signing the paper of the confidential.
  • Technology: The technology is used to prevent the hardware and the software to develop the system.

Part -3:

Data owner or custodian:

  • Chief information officer will be a head of the information technology in the organization and the officer will report the data owner of information to the chief financial officer and Information technology of the organization of the executive officer.
  • Chief information security officer of the concentrations will be in the IT organization and it reports to the data custodian of the responsibilities such as security policy management and development, the security awareness, the security training and the management of the ethical hackers.
  • The system administrator will be reported towards the data custodian and it maintains the computer network to install the support, server maintaining, to supervise the computer operators through the technical staff knowledge.

Part - 4:

The large company in current location:

The large company in the current location of Bangalore is Infosys and it is the multinational corporation limited will provide the business consulting and also the information of the outsourcing services .The head quartered is in bangalore and the total strength of the employees are 2,42,371.The CEO is easy to find and the hardest way to find CSIO.

Part-5:

About kevin mitnik:

Kevin Mitnick is a convicted hacker in America and it is high profile for arresting because of the communication related crimes and also the chief hacking officer of the security awareness at Zimperium and it is used to develop the mobile interruption prevention system.

 

 

 

Part-6: 

The " iterative and the incremental development", investigate "agile development":

The iteration method is used for the software development and it the combination long standing large development efforts and while in the software development have more than one iteration is evolution in the same time and it is incremental build model and the relationship between the iterations and the agile development will be the overall software development process having the exact number and having the particular incremental builds iterated with specific with each individual effort.

Reference: Introduction to information security(2021). Retrieved 12 January 2021, from https://www.cengage.com/resource_uploads/downloads/1111138214_259146.pdf