WEEK 3 ESSAY QUESTIONS
Instructions: Answer all questions in a single document. Then
submit to the
appropriate assignment folder. Each response to a single essay
question should
be about a half-page in length (about 150 words).
1. Cryptographic algorithms provide the underlying tools to
most security
protocols used in today’s infrastructures. The choice of which
type of
algorithm depends on the goal that you are trying to accomplish,
such as
encryption or data integrity. These algorithms fall into two main
categories:
symmetric key and asymmetric key cryptography. In this essay,
please
discuss the strengths and weaknesses of symmetric key
cryptography and
give an example of where this type of cryptography is used.
Then discuss
the strengths and weaknesses of asymmetric key cryptography
and give an
example of where this type of cryptography is used.
2. Cryptography has been used in one form or another for over
4000 years
and attacks on cryptography have been occurring since its
inception. The
type of people attempting to break the code could be malicious
in their
intent or could just be trying to identify weaknesses in the
security so that
improvements can be made. In your essay response, define
cryptanalysis
and describe some of the common cryptanalytic techniques used
in attacks.
3. Many people overlook the importance of physical security
when addressing
security concerns of the organization. Complex cryptography
methods,
stringent access control lists, and vigilant intrusion
detection/prevention
software will be rendered useless if an attacker gains physical
access to
your data center. Site and facility security planning is equally
important to
the technical controls that you implement when minimizing the
access a
criminal will have to your assets. In your essay response, define
CPTED and
describe how following the CPTED discipline can provide a
more aesthetic
alternative to classic target hardening approaches. Make sure
that the
three CPTED strategies are covered in your response.
WEEK 1 ESSAY QUESTIONS
Instructions: Answer all questions in a single document. Then
submit to the
appropriate assignment folder. Each response to a single essay
question should
be about a half-page in length (about 150 words).
1. In this week’s readings, you learned about two methods of
risk analysis:
quantitative assessment and qualitative assessment. Explain the
steps
taken to assess a risk from a quantitative perspective where
monetary and
numeric values are assigned and discuss the formulas used to
quantify risk.
Then, explain the methods used to assess risk from a qualitative
perspective where intangible values are evaluated such as the
seriousness
of the risk or ramifications to the reputation of the company.
2. Domain 1 introduced numerous security terms that are used
in assessing
risk. Please define the terms vulnerability, threat, threat agent,
risk,
exposure and control. Then, describe the three different control
types and
give examples for each.
3. After you’ve conducted your risk assessment and determined
the amount
of total and residual risk, you must decide how to handle it.
Describe the
four basic ways of handling risk.
WEEK 2 ESSAY QUESTIONS
Instructions: Answer all questions in a single document. Then
submit to the
appropriate assignment folder. Each response to a single essay
question should
be about a half-page in length (about 150 words).
1. Not all information has the same importance and value to a
company. How
data is classified is an important factor used in determining the
amounts of
funding and resources that should be applied to protecting each
type of
data. Describe the data classification levels within commercial
and military
organizations and provide examples of the types of information
that would
be classified at each classification level.
2. It takes a team of individuals throughout the organization
working together
to safeguard the integrity and confidentiality of data resources.
Describe
the layers of responsibility within an organization when it
comes to asset
security and data protection. For each role, discuss their
responsibility
within the organization for asset security.
3. The architecture of a computer system is very important and
comprises
many topics. The system must ensure that memory is properly
segregated
and protected, ensure that only authorized subjects access
objects, ensure
that untrusted processes cannot perform activities that would
put other
processes at risk, control the flow of information, and define a
domain of
resources for each subject. It also must ensure that if the
computer
experiences any type of disruption, it will not result in an
insecure state.
Many of these issues are dealt with in the system’s security
policy, and the
security mode is built to support the requirements of this policy.
Explain
the concept of a trusted computing base and describe how it is
used to
enforce the system’s security policy. Provide examples of
specific elements
(hardware, software or firmware) in the architecture of the
computer
system could be used that provide security within the TCB.
WEEK 4 ESSAY QUESTIONS
Instructions: Answer all questions in a single document. Then
submit to the
appropriate assignment folder. Each response to a single essay
question should
be about a half-page in length (about 150 words).
1. Communications within a computer network rely on
numerous
components for data to traverse from the initial sender of a
message or file
to the receiver at the distant end of the communication path. In
addition to
the media that the data travels across, the devices that guide the
data
packets through the network, and the protocols that establish
end-to-end
connectivity and negotiate the communication, network services
play a
critical role in providing the necessary addressing and name
resolution
services. Describe the following services and their role in
network
communications: ARP, DHCP, ICMP, SNMP, and DNS.
2. Modern organizations rely on the Internet for information and
research
necessary to stay competitive but this access can come with
significant risk
if they don’t take the necessary steps to safeguard their internal
resources
from outside attackers. In this week’s reading, various types of
firewalls and
firewall configurations were discussed. Describe the terms
bastion host,
DMZ, dual-homed firewall, screened host, and screened subnet
and their
roles in firewall architectures.
3. Many organizations employ a mobile workforce and/or
provide the option
of telework to their employees to allow them to work from
home. In both
situations, a secure means of accessing the corporate network
remotely
must be provided. Discuss the four main tunneling protocols
used to
provide virtual private network access between remote users and
their
corporate network.
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx

WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx

  • 1.
    WEEK 3 ESSAYQUESTIONS Instructions: Answer all questions in a single document. Then submit to the appropriate assignment folder. Each response to a single essay question should be about a half-page in length (about 150 words). 1. Cryptographic algorithms provide the underlying tools to most security protocols used in today’s infrastructures. The choice of which type of algorithm depends on the goal that you are trying to accomplish, such as encryption or data integrity. These algorithms fall into two main categories: symmetric key and asymmetric key cryptography. In this essay, please discuss the strengths and weaknesses of symmetric key cryptography and give an example of where this type of cryptography is used. Then discuss the strengths and weaknesses of asymmetric key cryptography and give an example of where this type of cryptography is used. 2. Cryptography has been used in one form or another for over 4000 years and attacks on cryptography have been occurring since its inception. The type of people attempting to break the code could be malicious in their
  • 2.
    intent or couldjust be trying to identify weaknesses in the security so that improvements can be made. In your essay response, define cryptanalysis and describe some of the common cryptanalytic techniques used in attacks. 3. Many people overlook the importance of physical security when addressing security concerns of the organization. Complex cryptography methods, stringent access control lists, and vigilant intrusion detection/prevention software will be rendered useless if an attacker gains physical access to your data center. Site and facility security planning is equally important to the technical controls that you implement when minimizing the access a criminal will have to your assets. In your essay response, define CPTED and describe how following the CPTED discipline can provide a more aesthetic alternative to classic target hardening approaches. Make sure that the three CPTED strategies are covered in your response. WEEK 1 ESSAY QUESTIONS Instructions: Answer all questions in a single document. Then submit to the appropriate assignment folder. Each response to a single essay
  • 3.
    question should be abouta half-page in length (about 150 words). 1. In this week’s readings, you learned about two methods of risk analysis: quantitative assessment and qualitative assessment. Explain the steps taken to assess a risk from a quantitative perspective where monetary and numeric values are assigned and discuss the formulas used to quantify risk. Then, explain the methods used to assess risk from a qualitative perspective where intangible values are evaluated such as the seriousness of the risk or ramifications to the reputation of the company. 2. Domain 1 introduced numerous security terms that are used in assessing risk. Please define the terms vulnerability, threat, threat agent, risk, exposure and control. Then, describe the three different control types and give examples for each. 3. After you’ve conducted your risk assessment and determined the amount
  • 4.
    of total andresidual risk, you must decide how to handle it. Describe the four basic ways of handling risk. WEEK 2 ESSAY QUESTIONS Instructions: Answer all questions in a single document. Then submit to the appropriate assignment folder. Each response to a single essay question should be about a half-page in length (about 150 words). 1. Not all information has the same importance and value to a company. How data is classified is an important factor used in determining the amounts of funding and resources that should be applied to protecting each type of data. Describe the data classification levels within commercial and military organizations and provide examples of the types of information that would be classified at each classification level.
  • 5.
    2. It takesa team of individuals throughout the organization working together to safeguard the integrity and confidentiality of data resources. Describe the layers of responsibility within an organization when it comes to asset security and data protection. For each role, discuss their responsibility within the organization for asset security. 3. The architecture of a computer system is very important and comprises many topics. The system must ensure that memory is properly segregated and protected, ensure that only authorized subjects access objects, ensure that untrusted processes cannot perform activities that would put other processes at risk, control the flow of information, and define a domain of resources for each subject. It also must ensure that if the computer experiences any type of disruption, it will not result in an insecure state. Many of these issues are dealt with in the system’s security
  • 6.
    policy, and the securitymode is built to support the requirements of this policy. Explain the concept of a trusted computing base and describe how it is used to enforce the system’s security policy. Provide examples of specific elements (hardware, software or firmware) in the architecture of the computer system could be used that provide security within the TCB. WEEK 4 ESSAY QUESTIONS Instructions: Answer all questions in a single document. Then submit to the appropriate assignment folder. Each response to a single essay question should be about a half-page in length (about 150 words). 1. Communications within a computer network rely on numerous components for data to traverse from the initial sender of a message or file to the receiver at the distant end of the communication path. In addition to the media that the data travels across, the devices that guide the data packets through the network, and the protocols that establish
  • 7.
    end-to-end connectivity and negotiatethe communication, network services play a critical role in providing the necessary addressing and name resolution services. Describe the following services and their role in network communications: ARP, DHCP, ICMP, SNMP, and DNS. 2. Modern organizations rely on the Internet for information and research necessary to stay competitive but this access can come with significant risk if they don’t take the necessary steps to safeguard their internal resources from outside attackers. In this week’s reading, various types of firewalls and firewall configurations were discussed. Describe the terms bastion host, DMZ, dual-homed firewall, screened host, and screened subnet and their roles in firewall architectures. 3. Many organizations employ a mobile workforce and/or provide the option of telework to their employees to allow them to work from home. In both situations, a secure means of accessing the corporate network remotely must be provided. Discuss the four main tunneling protocols used to provide virtual private network access between remote users and their corporate network.