Week two of our material provided us with several different elements of the homeland security assessment process. What I gathered most from the material was based on the “Baldrige Assessment Criteria and the eight step process for a successful assessment” (Fisher, 2004). However, the consensus is that the key elements in the homeland security assessment process are “a threat assessment, a vulnerability assessment and a criticality assessment” (Decker, 2001). In my opinion, these three key…
The computer technology is a double edged weapon and this was the case in the therac-25 as its purpose was to treat patients, but as a result of the misuse of computer technology it harmed six innocent people. The problem with the design of the machine was that it was mainly controlled by its software and not its hardware. The programmer did not take into consideration that he was designing a machine that emits dangerous types of radiation that can be life threatening if they are not well…
and applications to search and find the smart thing's services they need, however in this section the main concern is to know more the next layer which is sharing layer. This layer’s main concern is to keep human and machine updated with the new information so the main concern was making this communication secure and free from hacks so researchers tried to use already existing protocols like HTTP that is already provides authentication mechanisms for securely sharing resources by which it allows…
take the right precautions and keep information secure to prevent any identity theft from occurring. Keeping Information Private According to USA.gov, there are a number of ways to prevent identity theft. It is important to keep passwords private and not to share them with anyone or let anyone see you typing in passwords so they cannot login to your private information. Another important way to prevent identity theft would be to not share personal information…
Introduction In 2017, there have been several high profile cyber-attacks that have affected various systems across the country and the world. Among these cyber-criminals is the group known as the Shadow Brokers who debuted in August 2016 after claiming to have breached the spy tools of the Equation Group, an elite NSA-linked operation. In April 2017, the Shadow Brokers released what is said to be significant NSA tools which individuals have used to infect computer systems with ransomware. As a…
Bradlee Shipley COMM200 11 October 2015 PREPARATION OUTLINE-Security Forces Purpose Statement: To inform my audience about my choice to join the United States Air Force Security Forces career field. Thesis Statement: The Security Forces (SF) career field requires an understanding of military jurisdiction, use of force procedures and the operations and training functions in order to be a capable security forces member. Introduction Attention Getter: Today, I’ll be discussing military…
The best way to evaluate a denial of service (DoS) incident is to base it on the incident analysis that was previously done. From the analysis we had gathered valuable information and this is my evaluation. After getting complaints that the network was running slow I immediately started to do an incident analysis to find out what was happening (Tipton & Frause 2007). So, I decided to use the National Institute of Standards and Technology methodology to seek the answers. Using the Detection…
several times and have always been frustrating the IT professionals. It’s great that each day technology is taking new phases and flourishing its potentiality, but the advancing field is also becoming a growing opportunity for invaders to breach security. By the time you recognize the attack, damage is already done, leaving you with nothing but an infected system. To prevent potential data injury, you need to be quick and proactive. Here are few steps that can help offset the deadly…
and~\ref{aaadrawbacks}, the current solution of AAA has various vulnerabilities and limitations. These vulnerabilities has caused user data hijack and breach, identity theft and financial loss. These issues are becoming more common and frequent which has sparked the security concerns over current AAA framework and end-user are becoming more concerned about their digital identity and privacy. Beside these, repeated user registration across different services respectively, to use services is…
converged technology within an organisation should be a conscious decision, however, with wireless there exists a very real threat of unauthorised implementations. This ultimately creates a risk to the information assets within an organisation, even when there is no perceived threat. So in the security policy the organisation can state its stance upon the installation of wireless access points, in that at the very least they must have prior authorisation and adhere to specific configurations.…