Questions! Due by 2am tonight! Please write question and include references!

  • As the Information Systems Security Officer for your large health care company, you have been assigned the task of implementing Web security. Determine how you would implement security to eliminate single points of failure.
  • Describe the implementation of Secure Sockets Layer (SSL) in support of Hypertext Transfer Protocol Secure (HTTPS). Assess how you are assured that your browser is secure. Determine if the user data truly is protected or this is a false sense of security. Give an example of SSL being compromised.
  • Explain in your own words the necessity of a hacker concealing his / her actions in the hacking process. Determine what you believe to be, if any, the repercussions that exist for a hacker who doesn’t appropriately cover his / her tracks.
  • From the e-Activity, explain in your own words the processes used by the Stuxnet attackers to conceal their actions. Discuss why you believe these were successful in being undetected for such a long period of time.
  • Many say that once physical access is obtained by an intruder that all security is lost.
    • Determine whether or not you believe this is a true statement. Explain in your opinion whether or not wireless networks have decreased the need for hackers to gain physical intrusion.
    • Compare and contrast the security concerns between wired and wireless networks. Determine which you, as senior level management, would consider the greater area of risk and warrant greater security control expenditures. Justify your answer. 
  • Compare and contrast two common threats to wireless local area networks (WLANs) and the security controls that could be implemented to combat each. Imagine you are an Information Technology (IT) Security Director. Explain which of these threats would cause more concern for your organization and how you would justify the expenditures of the selected security concerns to upper management.
    • 6 years ago
    • 13