question archive 1) Look up "the paper that started the study of computer security
Subject:Computer SciencePrice:4.87 Bought7
1) Look up "the paper that started the study of computer security." Prepare a summary of the key points. What in this paper specifically addresses security in previously unexamined areas?
2. Assume that a security model is needed for the protection of information in your class. Using the CNSS model, examine each of the cells and write a brief statement on how you would address the three components of each cell.
3. Using the Web, identify the chief information officer (CIO), chief information security officer (CISO), and systems administrator for your school. Which of these people represents the data owner? Which represents the data custodian?
4. Using the Web, find a large company or government agency that is familiar to you or located in your area. Try to find the name of the chief executive officer (CEO), the CIO, and the CISO. Which was easiest to find? Which was hardest?
5. Using the Web, find out more about Kevin Mitnick. What did he do? Who caught him? Write a short summary of his activities and explain why he is infamous.
6. Using the Web, explore the technique known as "iterative and incremental development." Then, investigate "agile development." How are they related?
Answer:
Part-1:
1.The study of the computer security key points is summarized:
The computer security goal is used to improve the security and the safety are as follows a s
2.The addresses security in the previously unexamined areas:
Part-2:
The three components of each cell using the CNSS model:
The three components of each cell using the Committee on National Security System have the three-security model and the goals of the first model is Confidentiality, Integrity, Availability is the first model and the second model is Transmission, Storage and Processing and the third model is Policy, Technology and the Education.
Part-3:
Identify the data owner or data custodian:
Part - 4:
The large company in Bangalore and the name of the chief executive officer (CEO), the CIO, and the CISO require to know easiest to find CEO or CISO and hardest find:
Company: Infosys
The CEO is Salil Parekh
The CIO is Rajesh Varrier
The CISO is Vishal Salvi's
CEO is easiest to find and Ciso is hardest to find.
Part-5:
To know more about the Kevin mitnik:
Part-6:
The Technique known as" iterative and the incremental development", investigate "agile development" and related two techniques:
1. The iterative and the increment development is defining the developing software in the process development and the system of the iterative end of the incremental development of the system has smaller portions declared as the increment and the running for each increment by the cycles.
2.The agile development is defined as the traditional software of the project management and it is used to help in the development of the iterations for all the software life cycles and it easy to find the errors and also to reduce the fault.
3.The technique of the "iterative and the increment development "and the "agile development" is related to the agile development will followed the iterative model of the model of the software to minimize the models in the risk of the stakeholder fulfilment and the output of the product is the faster delivery.
Step-by-step explanation
Part-1:
1.The key points of the network security:
The network security of the user or the program will access the network computer is linked towards the network without changing the program and it is also interconnecting the computers to create the techniques and to increase the experience. The network security is increasing the productivity resources through sharing the resources.
2.Unexamined until now for the address security:
To unexamined the address security have less security for the dial up users, to set the password creating is still deficient and not easy to identify the present users.
Part-2:
The CNSS model of three components:
Part -3:
Data owner or custodian:
Part - 4:
The large company in current location:
The large company in the current location of Bangalore is Infosys and it is the multinational corporation limited will provide the business consulting and also the information of the outsourcing services .The head quartered is in bangalore and the total strength of the employees are 2,42,371.The CEO is easy to find and the hardest way to find CSIO.
Part-5:
About kevin mitnik:
Kevin Mitnick is a convicted hacker in America and it is high profile for arresting because of the communication related crimes and also the chief hacking officer of the security awareness at Zimperium and it is used to develop the mobile interruption prevention system.
Part-6:
The " iterative and the incremental development", investigate "agile development":
The iteration method is used for the software development and it the combination long standing large development efforts and while in the software development have more than one iteration is evolution in the same time and it is incremental build model and the relationship between the iterations and the agile development will be the overall software development process having the exact number and having the particular incremental builds iterated with specific with each individual effort.
Reference: Introduction to information security(2021). Retrieved 12 January 2021, from https://www.cengage.com/resource_uploads/downloads/1111138214_259146.pdf