Computer Science Homework Help

Cumberland University Health Network Risk Mitigation Plan Paper

 

Risk Mitigation Plan

Senior management at Health Network allocated funds to support a risk mitigation plan. They have requested that the risk manager and team create a plan in response to the deliverables produced within earlier phases of the project.

The risk mitigation plan should address the identified threats described in the scenario for this project, as well as any new threats that may have been discovered during the risk assessment. You have been assigned to develop a draft of this new plan.

Submission Requirements

  • Format: Microsoft Word
  • Font: Arial, size 12, double-space

Estimated length: 4–6 pages

Computer Science Homework Help

INFA 610 UMDC Attacks on Networks Physical Security Threats Discussion

 

Reply:

Peer 1:

Layer 4 of the OSI model is the Transport Layer. According to an article in Infoblox, the Transport Layer is responsible for transferring data between end users and providing reliable data transfer services to the upper layers. The Transport Layer controls the reliability of given links through the use of flow control, segmentation and desegmentation and error control. Further, the Transport Layer can keep track of segments for protocols that are state and connection-oriented. The Transport Layer is also able to resend segments for those that fail.  This is also the layer that provides acknowledgement of data sent successfully and it will send the next data if there were no other errors. Typical examples of Layer 4 include Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). The difference between TCP and UDP is that TCP prioritizes data quality over speed and UDP is a connectionless protocol that prioritizes speed over quality. Both protocols are rules that are in place regarding how to send data packets.

Something interesting about the Transport Layer is that this layer can be prone to some of the threats to previous media layers (Platsis, 2021).  One can expect sniffing, especially related to ports and protocols. DDoS attacks are also common at this layer. Other types of attacks that are typical at the Transport Layer include SYN Floods and SMURF attacks. In a SYN flood, a hacker initiates multiple connections to a server using a spoofed IP address, while not waiting for a connection to finalize. Smurf attacks use malware to overload network resources. The attacker then broadcasts Internet Control Message Protocol echoes, which causes an infinite loop of requests. To mitigate attacks of this layer, it’s recommended to lock down ports and configure firewalls for only what is needed and gate access to your transmission protocols. Overall, it’s important for the Transport Layer to be as error-free as possible because there is a lot going on with all of the packet movement.

References

Platsis, G., George Platsis Senior Lead Technologist, Platsis, G., Technologist, S. L., & George Platsis works with the private. (2021, June 14). The OSI model and you part 4: Stopping threats at the OSI transport layer. Security Intelligence. Retrieved October 22, 2021, from https://securityintelligence.com/articles/osi-model-stopping-threats-osi-transport-layer/.

What is layer 4 of the OSI model: Transport layer?: DDI (secure DNS, DHCP, IPAM). Infoblox. (2021, April 27). Retrieved October 22, 2021, from https://www.infoblox.com/glossary/layer-4-of-the-osi-model-transport-layer/

Peer 2:

Physical Security Threats

Threats today range from hybrid attacks to targeting both physical and cyber assets.  With the adoption and integration of Internet of Things (IoT) and the Industrial Internet of Things (IIoT)  devices has increased interconnected mesh of cyber-physical system (CPS), that expands the attack surface and blurs the once clear functions of cybersecurity and physical security in this new threat landscape.

This new landscape allows for successful cyber/physical attacks on industrial control systems (ICS) to disrupt operations and deny services to the population affected by the attack.  Cybersecurity & Infrastructure Security Agency (CISA) provides examples of types of physical attacks (CISA 2021):

  • A Security gap in access controls-  an unauthorized access to facilities or system permissions, can allow an individual to use a USB or removable hardware to introduce a virus or malware to a network
  • HVAC systems  can be virtually overridden, causing rising temperatures to disable network servers.
  • Law enforcement and emergency services can have impaired communications if a cyber attack on their telecommunication system that can result in loss of life and delayed response times.
  • Medical device malfunctions can be detrimental causing injury or loss of life when a cyberattack exploits an healthcare target.
  • An unmanned aircraft, can compromise sensitive data if access is gained using an unsecured network using wireless hacking technology.

As cyber-physical attack continue to grow, global insurance companies are trying to ascertain how much to cover for such a dynamic risk as attacks are constantly evolving.  There are so many potential attack surfaces, vectors and avenues there are infinite possibilities for cyber-physical attacks as the world moves forward with self-driven cars, telehealth, medical devices, traffic flow sensors, drones, transit systems.    The triad’s approach to Confidentiality, Integrity and Availability, with Confidentiality at the forefront with physical security, will need strict access controls, educating all users of technology of the dangers of cyber world.  (Hamilton 2021)

References

CISA (2021) “ Cybersecurity and Physical Security Convergence” Cybersecurity & Infrastructure Security Agency Cybersecurity and Physical Security Convergence (cisa.gov)

Hamilton, E., (July 2021) “ What are Cyber-Physical Attacks?” The Science Times What Are Cyber-Physical Attacks? | Science Times

Computer Science Homework Help

CS 368T Colorado Technical University Online Change to User Requirement Essay

 

Provide a simple example of a minor change to a user
requirement on a system of your choice. Based on the user change
request, describe the complexity of tracing this change throughout the
system’s products. The complexity can be described by providing an
example for each system product that would need to be changed. Provide
at least 8 system products that are impacted and must be traced to
ensure the change is correctly implemented.

Be sure to include the following in your response:

  • Describe a simple user change, along with the system description that requires this change
  • Trace the change through at least 8 system products, demonstrating the complexity of implementing the simple change

Computer Science Homework Help

JNTU XSS Attacks and Movie War Game Project

 

Use the Web to search for methods to prevent XSS attacks.

Write a brief description of more than one method.

———————————————-

Course: Policy, Legal, Ethics Cmplc : 

Watch the Movie War Games from 1983. According to the New York Times, this movie had a tremendous effect on President Ronald Reagan.  Discuss in 500 words your opinion on whether it should be required viewing in social studies classes in high school. Do not repeat the story. Discuss it’s use in school. 

Computer Science Homework Help

NA 1 JNTU War Games Movie and Methods of Preventing XSS Attacks Analysis

 

Use the Web to search for methods to prevent XSS attacks.

Write a brief description of more than one method.

——————————————————-

Course: Policy, Legal, Ethics Cmplc : 

Watch the Movie War Games from 1983. According to the New York Times, this movie had a tremendous effect on President Ronald Reagan.  Discuss in 500 words your opinion on whether it should be required viewing in social studies classes in high school. Do not repeat the story. Discuss it’s use in school. 

Computer Science Homework Help

NA 5 JNTU Network Hardening and Cyber Security Essay

 

In 500 words, Research the variety of enumeration tools available. Select one tool and explain what it does, how it works and what type of information it extracts (example:  Softerra LDAP Browser is the industry-leading software for browsing and analyzing LDAP directories. It provides a wide variety of features for handy viewing of directory contents, getting information about directory infrastructure and objects.)

Use at least three sources. Use the Research Databases available from the Danforth Library (https://libguides.nec.edu/az.php) not Google.   Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0.

Write in essay format not in bulleted, numbered or other list format

———————————–

Visit the “whois” website (https://www.whois.com/whois/). Find out who owns the site, who manages the site, the site creation date, the registry expiry date, and where they are located (what country) for each of the following sites:

1) New England College (www.nec.edu)

2) Google

3) Bank of America, Bank of India, or Your bank

4) One more (your choice)

Computer Science Homework Help

JNTU Cybersecurity Planning and Management Essay

 

I’m working on a computer science question and need an explanation to help me study.

Sub: Cybersecurity Planning and Management

In 500 words, Do you believe Artificial Intelligence or Machine Learning is the future of cybersecurity? Explain why or why not?