SlideShare a Scribd company logo
1 of 3
In your role as a highly paid consultant, you are given a list of
potential threats
to and vulnerabilities of the current communication security
protocols of an organization. You are asked to provide
quantitative data to measure the likelihood that any of these
threats will actually occur for the information assets of the
client. Conduct research and describe resources you found that
might provide insight into measuring the likelihood that some of
the threats would actually occur. In the explanation, include
whether you see a trend in resources that might indicate a
specific industry is particularly involved in gathering this kind
of data. Additionally, evaluate which communication security
protocols are more effective and provide an explanation.
Requires( 2 pages with 3 intext citations and references)
List of Possible Threats/Vulnerabilities
Spoofing
is attempting to gain access to a system by using a false
identity. This can be accomplished using stolen user credentials
or a false IP address. After the attacker successfully gains
access as a legitimate user or host, elevation of privileges or
abuse using authorization can begin.
Tampering
is the unauthorized modification of data, for example, as it
flows over a network between two computers.
Repudiation
is the ability of users (legitimate or otherwise) to deny that they
performed specific actions or transactions. Without adequate
auditing, repudiation attacks are difficult to prove.
Information disclosure
is the unwanted exposure of private data. For example, a user
views the contents of a table or file he or she is not authorized
to open, or monitors data passed in plaintext over a network.
Some examples of information disclosure vulnerabilities include
the use of hidden form fields, comments embedded in webpages
that contain database connection strings and connection details,
and weak exception handling that can lead to internal system-
level details being revealed to the client. Any of this
information can be very useful to the attacker.
Denial of service
is the process of making a system or application unavailable.
For example, a denial of service attack might be accomplished
by bombarding a server with requests to consume all available
system resources or by passing it malformed input data that can
crash an application process.
Elevation of privilege
occurs when a user with limited privileges assumes the identity
of a privileged user to gain privileged access to an application.
For example, an attacker with limited privileges might elevate
his or her privilege level to compromise and tak
e control of a highly privileged and trusted process or account
Rubrics for the Assignment : Attached to the document please
redo it immediately and i want in 10 hours
[removed]
Professor Comments :
This assignment needs some work. You needed to take each of
the threats and do analysis on each one. This analysis would
include quantitative data as well as the likelihood. You have no
numbers in your paper to work from. Also, I couldn't find a
section regarding recent trends or secure communication
protocols within your assignment.

More Related Content

Similar to In your role as a highly paid consultant, you are given a list of.docx

A Review Report on Security Threats on Database
A Review Report on Security Threats on DatabaseA Review Report on Security Threats on Database
A Review Report on Security Threats on DatabaseShivnandan Singh
 
1.Review news reports from a specific data breach. Choose a breach f.pdf
1.Review news reports from a specific data breach. Choose a breach f.pdf1.Review news reports from a specific data breach. Choose a breach f.pdf
1.Review news reports from a specific data breach. Choose a breach f.pdfarihantpatna
 
Owasp Top 10 2017
Owasp Top 10 2017Owasp Top 10 2017
Owasp Top 10 2017SamsonMuoki
 
Bluedog white paper - Our WebObjects Web Security Model
Bluedog white paper - Our WebObjects Web Security ModelBluedog white paper - Our WebObjects Web Security Model
Bluedog white paper - Our WebObjects Web Security Modeltom termini
 
Research Paper on STRIDEPresented By.docx
Research Paper on STRIDEPresented By.docxResearch Paper on STRIDEPresented By.docx
Research Paper on STRIDEPresented By.docxronak56
 
Overview of Vulnerability Scanning.pptx
Overview of Vulnerability Scanning.pptxOverview of Vulnerability Scanning.pptx
Overview of Vulnerability Scanning.pptxAjayKumar73315
 
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...IRJET Journal
 
Risk Analysis Report review
Risk Analysis Report reviewRisk Analysis Report review
Risk Analysis Report reviewLarry Yurdin
 
information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...Zara Nawaz
 
Introduction All research reports begin with an introduction. (.docx
Introduction All research reports begin with an introduction. (.docxIntroduction All research reports begin with an introduction. (.docx
Introduction All research reports begin with an introduction. (.docxvrickens
 
Top ten database_threats
Top ten database_threatsTop ten database_threats
Top ten database_threatsFITSFSd
 
1. Respond to other student Discussion Board providing additional
1. Respond to other student Discussion Board providing additional 1. Respond to other student Discussion Board providing additional
1. Respond to other student Discussion Board providing additional TatianaMajor22
 
NDSS_submission_240
NDSS_submission_240NDSS_submission_240
NDSS_submission_240Sakshi Jain
 

Similar to In your role as a highly paid consultant, you are given a list of.docx (20)

A Review Report on Security Threats on Database
A Review Report on Security Threats on DatabaseA Review Report on Security Threats on Database
A Review Report on Security Threats on Database
 
Unit 1
Unit 1Unit 1
Unit 1
 
1.Review news reports from a specific data breach. Choose a breach f.pdf
1.Review news reports from a specific data breach. Choose a breach f.pdf1.Review news reports from a specific data breach. Choose a breach f.pdf
1.Review news reports from a specific data breach. Choose a breach f.pdf
 
Owasp Top 10 2017
Owasp Top 10 2017Owasp Top 10 2017
Owasp Top 10 2017
 
Bluedog white paper - Our WebObjects Web Security Model
Bluedog white paper - Our WebObjects Web Security ModelBluedog white paper - Our WebObjects Web Security Model
Bluedog white paper - Our WebObjects Web Security Model
 
Research Paper on STRIDEPresented By.docx
Research Paper on STRIDEPresented By.docxResearch Paper on STRIDEPresented By.docx
Research Paper on STRIDEPresented By.docx
 
Information Security
Information SecurityInformation Security
Information Security
 
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKINGIMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
 
Overview of Vulnerability Scanning.pptx
Overview of Vulnerability Scanning.pptxOverview of Vulnerability Scanning.pptx
Overview of Vulnerability Scanning.pptx
 
Unit 1
Unit 1Unit 1
Unit 1
 
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
 
Risk Analysis Report review
Risk Analysis Report reviewRisk Analysis Report review
Risk Analysis Report review
 
information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...
 
Introduction All research reports begin with an introduction. (.docx
Introduction All research reports begin with an introduction. (.docxIntroduction All research reports begin with an introduction. (.docx
Introduction All research reports begin with an introduction. (.docx
 
Top ten database_threats
Top ten database_threatsTop ten database_threats
Top ten database_threats
 
Security Awareness
Security AwarenessSecurity Awareness
Security Awareness
 
cryptographic security
cryptographic securitycryptographic security
cryptographic security
 
1. Respond to other student Discussion Board providing additional
1. Respond to other student Discussion Board providing additional 1. Respond to other student Discussion Board providing additional
1. Respond to other student Discussion Board providing additional
 
IT.pptx
IT.pptxIT.pptx
IT.pptx
 
NDSS_submission_240
NDSS_submission_240NDSS_submission_240
NDSS_submission_240
 

More from doylymaura

Inventory Management Homework Set  You work in the administrat.docx
Inventory Management Homework Set  You work in the administrat.docxInventory Management Homework Set  You work in the administrat.docx
Inventory Management Homework Set  You work in the administrat.docxdoylymaura
 
Inventory Costing Methods Please respond to the followingUse.docx
Inventory Costing Methods Please respond to the followingUse.docxInventory Costing Methods Please respond to the followingUse.docx
Inventory Costing Methods Please respond to the followingUse.docxdoylymaura
 
Inventory Costing Methods Please respond to the followingUse th.docx
Inventory Costing Methods Please respond to the followingUse th.docxInventory Costing Methods Please respond to the followingUse th.docx
Inventory Costing Methods Please respond to the followingUse th.docxdoylymaura
 
Intrusion Detection Systems Objectives In this lab, st.docx
Intrusion Detection Systems Objectives In this lab, st.docxIntrusion Detection Systems Objectives In this lab, st.docx
Intrusion Detection Systems Objectives In this lab, st.docxdoylymaura
 
Introduction Understanding culture is essential for effectively ex.docx
Introduction Understanding culture is essential for effectively ex.docxIntroduction Understanding culture is essential for effectively ex.docx
Introduction Understanding culture is essential for effectively ex.docxdoylymaura
 
Inventory Management Homework Set You work in the .docx
Inventory Management Homework Set You work in the .docxInventory Management Homework Set You work in the .docx
Inventory Management Homework Set You work in the .docxdoylymaura
 
IntroductionI am 43 years old and married with three childre.docx
IntroductionI am 43 years old and married with three childre.docxIntroductionI am 43 years old and married with three childre.docx
IntroductionI am 43 years old and married with three childre.docxdoylymaura
 
IntroductionThroughout this course, the breadth and depth of you.docx
IntroductionThroughout this course, the breadth and depth of you.docxIntroductionThroughout this course, the breadth and depth of you.docx
IntroductionThroughout this course, the breadth and depth of you.docxdoylymaura
 
IntroductionPg. 2The Arrival Of Violence As A Key Component Of T.docx
IntroductionPg. 2The Arrival Of Violence As A Key Component Of T.docxIntroductionPg. 2The Arrival Of Violence As A Key Component Of T.docx
IntroductionPg. 2The Arrival Of Violence As A Key Component Of T.docxdoylymaura
 
IntroductionPatients usually go through a lot and in most inst.docx
IntroductionPatients usually go through a lot and in most inst.docxIntroductionPatients usually go through a lot and in most inst.docx
IntroductionPatients usually go through a lot and in most inst.docxdoylymaura
 
INTRODUCTION TO TERRORISMONLY ONE PARAGRAPH FOR THIS DISCUSSION ON.docx
INTRODUCTION TO TERRORISMONLY ONE PARAGRAPH FOR THIS DISCUSSION ON.docxINTRODUCTION TO TERRORISMONLY ONE PARAGRAPH FOR THIS DISCUSSION ON.docx
INTRODUCTION TO TERRORISMONLY ONE PARAGRAPH FOR THIS DISCUSSION ON.docxdoylymaura
 
IntroductionIn this module, you have learned about the intention.docx
IntroductionIn this module, you have learned about the intention.docxIntroductionIn this module, you have learned about the intention.docx
IntroductionIn this module, you have learned about the intention.docxdoylymaura
 
IntroductionBody part (literature review) which includesT.docx
IntroductionBody part (literature review) which includesT.docxIntroductionBody part (literature review) which includesT.docx
IntroductionBody part (literature review) which includesT.docxdoylymaura
 
Introduction to SociologyAll work must be original in APA Format, .docx
Introduction to SociologyAll work must be original in APA Format, .docxIntroduction to SociologyAll work must be original in APA Format, .docx
Introduction to SociologyAll work must be original in APA Format, .docxdoylymaura
 
Introduction to Sociology Unit 5 ProjectTextbook Help Macio.docx
Introduction to Sociology Unit 5 ProjectTextbook Help Macio.docxIntroduction to Sociology Unit 5 ProjectTextbook Help Macio.docx
Introduction to Sociology Unit 5 ProjectTextbook Help Macio.docxdoylymaura
 
INTRODUCTION TO CORRECTIONS  ONLY ONE PARAGRAPH AND A HALFInstruct.docx
INTRODUCTION TO CORRECTIONS  ONLY ONE PARAGRAPH AND A HALFInstruct.docxINTRODUCTION TO CORRECTIONS  ONLY ONE PARAGRAPH AND A HALFInstruct.docx
INTRODUCTION TO CORRECTIONS  ONLY ONE PARAGRAPH AND A HALFInstruct.docxdoylymaura
 
Introduction One or two pages to introduce the issue, group, or.docx
Introduction One or two pages to introduce the issue, group, or.docxIntroduction One or two pages to introduce the issue, group, or.docx
Introduction One or two pages to introduce the issue, group, or.docxdoylymaura
 
Introduction on Islamic philosophy In order to write about evolut.docx
Introduction on Islamic philosophy In order to write about evolut.docxIntroduction on Islamic philosophy In order to write about evolut.docx
Introduction on Islamic philosophy In order to write about evolut.docxdoylymaura
 
Introduction to Assignment This assignment contains a number of s.docx
Introduction to Assignment This assignment contains a number of s.docxIntroduction to Assignment This assignment contains a number of s.docx
Introduction to Assignment This assignment contains a number of s.docxdoylymaura
 
Introduction to Assignment This assignment contains a number .docx
Introduction to Assignment This assignment contains a number .docxIntroduction to Assignment This assignment contains a number .docx
Introduction to Assignment This assignment contains a number .docxdoylymaura
 

More from doylymaura (20)

Inventory Management Homework Set  You work in the administrat.docx
Inventory Management Homework Set  You work in the administrat.docxInventory Management Homework Set  You work in the administrat.docx
Inventory Management Homework Set  You work in the administrat.docx
 
Inventory Costing Methods Please respond to the followingUse.docx
Inventory Costing Methods Please respond to the followingUse.docxInventory Costing Methods Please respond to the followingUse.docx
Inventory Costing Methods Please respond to the followingUse.docx
 
Inventory Costing Methods Please respond to the followingUse th.docx
Inventory Costing Methods Please respond to the followingUse th.docxInventory Costing Methods Please respond to the followingUse th.docx
Inventory Costing Methods Please respond to the followingUse th.docx
 
Intrusion Detection Systems Objectives In this lab, st.docx
Intrusion Detection Systems Objectives In this lab, st.docxIntrusion Detection Systems Objectives In this lab, st.docx
Intrusion Detection Systems Objectives In this lab, st.docx
 
Introduction Understanding culture is essential for effectively ex.docx
Introduction Understanding culture is essential for effectively ex.docxIntroduction Understanding culture is essential for effectively ex.docx
Introduction Understanding culture is essential for effectively ex.docx
 
Inventory Management Homework Set You work in the .docx
Inventory Management Homework Set You work in the .docxInventory Management Homework Set You work in the .docx
Inventory Management Homework Set You work in the .docx
 
IntroductionI am 43 years old and married with three childre.docx
IntroductionI am 43 years old and married with three childre.docxIntroductionI am 43 years old and married with three childre.docx
IntroductionI am 43 years old and married with three childre.docx
 
IntroductionThroughout this course, the breadth and depth of you.docx
IntroductionThroughout this course, the breadth and depth of you.docxIntroductionThroughout this course, the breadth and depth of you.docx
IntroductionThroughout this course, the breadth and depth of you.docx
 
IntroductionPg. 2The Arrival Of Violence As A Key Component Of T.docx
IntroductionPg. 2The Arrival Of Violence As A Key Component Of T.docxIntroductionPg. 2The Arrival Of Violence As A Key Component Of T.docx
IntroductionPg. 2The Arrival Of Violence As A Key Component Of T.docx
 
IntroductionPatients usually go through a lot and in most inst.docx
IntroductionPatients usually go through a lot and in most inst.docxIntroductionPatients usually go through a lot and in most inst.docx
IntroductionPatients usually go through a lot and in most inst.docx
 
INTRODUCTION TO TERRORISMONLY ONE PARAGRAPH FOR THIS DISCUSSION ON.docx
INTRODUCTION TO TERRORISMONLY ONE PARAGRAPH FOR THIS DISCUSSION ON.docxINTRODUCTION TO TERRORISMONLY ONE PARAGRAPH FOR THIS DISCUSSION ON.docx
INTRODUCTION TO TERRORISMONLY ONE PARAGRAPH FOR THIS DISCUSSION ON.docx
 
IntroductionIn this module, you have learned about the intention.docx
IntroductionIn this module, you have learned about the intention.docxIntroductionIn this module, you have learned about the intention.docx
IntroductionIn this module, you have learned about the intention.docx
 
IntroductionBody part (literature review) which includesT.docx
IntroductionBody part (literature review) which includesT.docxIntroductionBody part (literature review) which includesT.docx
IntroductionBody part (literature review) which includesT.docx
 
Introduction to SociologyAll work must be original in APA Format, .docx
Introduction to SociologyAll work must be original in APA Format, .docxIntroduction to SociologyAll work must be original in APA Format, .docx
Introduction to SociologyAll work must be original in APA Format, .docx
 
Introduction to Sociology Unit 5 ProjectTextbook Help Macio.docx
Introduction to Sociology Unit 5 ProjectTextbook Help Macio.docxIntroduction to Sociology Unit 5 ProjectTextbook Help Macio.docx
Introduction to Sociology Unit 5 ProjectTextbook Help Macio.docx
 
INTRODUCTION TO CORRECTIONS  ONLY ONE PARAGRAPH AND A HALFInstruct.docx
INTRODUCTION TO CORRECTIONS  ONLY ONE PARAGRAPH AND A HALFInstruct.docxINTRODUCTION TO CORRECTIONS  ONLY ONE PARAGRAPH AND A HALFInstruct.docx
INTRODUCTION TO CORRECTIONS  ONLY ONE PARAGRAPH AND A HALFInstruct.docx
 
Introduction One or two pages to introduce the issue, group, or.docx
Introduction One or two pages to introduce the issue, group, or.docxIntroduction One or two pages to introduce the issue, group, or.docx
Introduction One or two pages to introduce the issue, group, or.docx
 
Introduction on Islamic philosophy In order to write about evolut.docx
Introduction on Islamic philosophy In order to write about evolut.docxIntroduction on Islamic philosophy In order to write about evolut.docx
Introduction on Islamic philosophy In order to write about evolut.docx
 
Introduction to Assignment This assignment contains a number of s.docx
Introduction to Assignment This assignment contains a number of s.docxIntroduction to Assignment This assignment contains a number of s.docx
Introduction to Assignment This assignment contains a number of s.docx
 
Introduction to Assignment This assignment contains a number .docx
Introduction to Assignment This assignment contains a number .docxIntroduction to Assignment This assignment contains a number .docx
Introduction to Assignment This assignment contains a number .docx
 

Recently uploaded

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 

Recently uploaded (20)

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 

In your role as a highly paid consultant, you are given a list of.docx

  • 1. In your role as a highly paid consultant, you are given a list of potential threats to and vulnerabilities of the current communication security protocols of an organization. You are asked to provide quantitative data to measure the likelihood that any of these threats will actually occur for the information assets of the client. Conduct research and describe resources you found that might provide insight into measuring the likelihood that some of the threats would actually occur. In the explanation, include whether you see a trend in resources that might indicate a specific industry is particularly involved in gathering this kind of data. Additionally, evaluate which communication security protocols are more effective and provide an explanation. Requires( 2 pages with 3 intext citations and references) List of Possible Threats/Vulnerabilities Spoofing is attempting to gain access to a system by using a false identity. This can be accomplished using stolen user credentials or a false IP address. After the attacker successfully gains access as a legitimate user or host, elevation of privileges or abuse using authorization can begin. Tampering is the unauthorized modification of data, for example, as it flows over a network between two computers. Repudiation is the ability of users (legitimate or otherwise) to deny that they performed specific actions or transactions. Without adequate auditing, repudiation attacks are difficult to prove.
  • 2. Information disclosure is the unwanted exposure of private data. For example, a user views the contents of a table or file he or she is not authorized to open, or monitors data passed in plaintext over a network. Some examples of information disclosure vulnerabilities include the use of hidden form fields, comments embedded in webpages that contain database connection strings and connection details, and weak exception handling that can lead to internal system- level details being revealed to the client. Any of this information can be very useful to the attacker. Denial of service is the process of making a system or application unavailable. For example, a denial of service attack might be accomplished by bombarding a server with requests to consume all available system resources or by passing it malformed input data that can crash an application process. Elevation of privilege occurs when a user with limited privileges assumes the identity of a privileged user to gain privileged access to an application. For example, an attacker with limited privileges might elevate his or her privilege level to compromise and tak e control of a highly privileged and trusted process or account Rubrics for the Assignment : Attached to the document please redo it immediately and i want in 10 hours
  • 3. [removed] Professor Comments : This assignment needs some work. You needed to take each of the threats and do analysis on each one. This analysis would include quantitative data as well as the likelihood. You have no numbers in your paper to work from. Also, I couldn't find a section regarding recent trends or secure communication protocols within your assignment.