2/13/2020 Quiz: 5.2 Core Module Assignment #5 https://psu.instructure.com/courses/2043139/quizzes/3773866/take 1/9 5.2 Core Module Assignment #5 Started: Feb 10 at 12:36am Quiz Instructions Answer all...

1 answer below »


THIS IS ABOUT RISK ASSESSMENT IN CYBER SECURITY
Please see the attached file and answer the 10 question with providing a significant explanation, the answers has to be well thought of and should be in the format of paragraphs


the following youtube video is for question 1



https://www.youtube.com/watch?time_continue=26&v=745hbOlNQz4&feature=emb_logo



Please use the link for the 1st question


2/13/2020 Quiz: 5.2 Core Module Assignment #5 https://psu.instructure.com/courses/2043139/quizzes/3773866/take 1/9 5.2 Core Module Assignment #5 Started: Feb 10 at 12:36am Quiz Instructions Answer all of the following questions and submit them using the quiz form linked below. It would probably be best if you type your answers in a separate document first, then when you are done, open the quiz and copy/paste your answers in the appropriate locations. 4 pts HTML Editor Question 1 Review the list of Top 10 Information Security Risks (https://www.youtube.com/watch?v=745hbOlNQz4/) Minimize Video described in the video after completing the Divergent-Convergent Thinking Exercise . To what extent are the items on this list similar to that obtained by your group? How are they different? Offer an explanation. Top 10 Security Risks on the InternetTop 10 Security Risks on the Internet                         12pt Paragraph https://www.youtube.com/watch?v=745hbOlNQz4/ https://psu.instructure.com/courses/2043139/files/105770563/download?wrap=1 https://psu.instructure.com/courses/2043139/files/105770563/download?wrap=1 https://www.youtube.com/watch?v=745hbOlNQz4 2/13/2020 Quiz: 5.2 Core Module Assignment #5 https://psu.instructure.com/courses/2043139/quizzes/3773866/take 2/9 0 words0 words  4 pts HTML Editor Question 2 Reflect on your experience applying the Divergent-Convergent Thinking method. What types of answers does DCT produce? What types of answers does DCT NOT produce? Discuss your experience applying the method. Do you believe the results? Do you trust the results? Why or why not?                         12pt Paragraph 2/13/2020 Quiz: 5.2 Core Module Assignment #5 https://psu.instructure.com/courses/2043139/quizzes/3773866/take 3/9 0 words0 words  4 pts HTML Editor Question 3 Suppose each risk identified in Part 1 is mutually exclusive with respect to each other. These risks represent causes of harm (i.e., events). How many causes of harm are on the mutually exclusive, collectively exhaustive list of possible causes considered here?                         12pt Paragraph 0 words0 words  4 pts HTML Editor Question 4 Suppose each risk identified in Part 1 is statistically independent with respect to each other. How many causes of harm are on the mutually exclusive, conditionally exhaustive list of possible causes considered here?                2/13/2020 Quiz: 5.2 Core Module Assignment #5 https://psu.instructure.com/courses/2043139/quizzes/3773866/take 4/9          12pt Paragraph 0 words0 words  4 pts HTML Editor Question 5 Suppose you have three possible outcomes following occurrence of an event. These are {no harm, some harm, a lot of harm}. Are elements of this set of outcomes mutually exclusive? Statistically independent? Can they be both? Why or why not?                         12pt Paragraph 2/13/2020 Quiz: 5.2 Core Module Assignment #5 https://psu.instructure.com/courses/2043139/quizzes/3773866/take 5/9 0 words0 words  4 pts HTML Editor Question 6 Suppose you have three dimensions of harm of concern - confidentiality, integrity, and availability. Following the occurrence of an event, you may or may not suffer a breach of confidentiality, integrity or availability. Whether you suffer loss of confidentiality is statistically independent from loss of integrity or loss of availability. Furthermore, suppose the outcome on each dimension is binary - loss or not. How many mutually exclusive, collectively exhaustive outcome possibilities do you have? List them.                         12pt Paragraph 2/13/2020 Quiz: 5.2 Core Module Assignment #5 https://psu.instructure.com/courses/2043139/quizzes/3773866/take 6/9 0 words0 words  4 pts HTML Editor Question 7 Suppose the list of causes you came up with is comprised of statistically independent events. Moreover, suppose your set of outcomes consists of those noted in the question above. How many mutually exclusive, conditionally exclusive risk scenarios do you have? List them.                         12pt Paragraph 2/13/2020 Quiz: 5.2 Core Module Assignment #5 https://psu.instructure.com/courses/2043139/quizzes/3773866/take 7/9 0 words0 words  4 pts HTML Editor Question 8 What is the relationship between the number of events (causes), number of outcomes, and number of risk scenarios? Suppose you only have a finite amount of time to do analysis, say to study 128 scenarios. How does increasing the number of possible outcomes (and outcome dimensions) affect the number of causes of harm you can consider? How does increasing the number of causes of harm affect the number of outcomes you can consider? What general rule can you deduce from this thought experiment given you have only a finite amount of time and resources to do analysis? Why calculate the number of scenarios?                         12pt Paragraph 0 words0 words  4 ptsQuestion 9 2/13/2020 Quiz: 5.2 Core Module Assignment #5 https://psu.instructure.com/courses/2043139/quizzes/3773866/take 8/9 HTML Editor What impact would changing one aspect of the security context affect your set of scenarios? Would such a change be significant? Why or why not?                         12pt Paragraph 0 words0 words  4 pts HTML Editor Question 10 How would you use Divergent-Convergent thinking to support risk analysis related to on- campus violence? Answer in a few concise sentences.                         12pt Paragraph 2/13/2020 Quiz: 5.2 Core Module Assignment #5 https://psu.instructure.com/courses/2043139/quizzes/3773866/take 9/9 No new data to save. Last checked at 10:17pm 0 words0 words  Submit Quiz
Answered Same DayFeb 14, 2021

Answer To: 2/13/2020 Quiz: 5.2 Core Module Assignment #5...

Rajeswari answered on Feb 16 2021
153 Votes
50751 Assignment
Question no.1
Top 10 security threats in the internet
1. SQL injection: Under this the attacker injects by sending a code which exploits the syntax of the targeted interpreter. The consequences are data loss, corruption or complete host take over. Prevention is to use interpreters which filter untrusted data from commands and queries.
2. Cross site Scripting (XXX)
: This is most serious as internet is more vulnerable to these
3. Broken authentication or session management which includes misuse of passwords, id, hacking of other person’s privacy etc.
4. Insecure direct object references – Normally this is done by an internal person who is authorized knowing everything about the network. This can be avoided by asking simultaneous authorization by a second authorized person.
5. Cross site reference forgery – This includes gaining the trust of victims by sending suitable mail, employee id etc and getting the private information to swindle funds from the account of the victims in a short span of time before they notice
6. Security misconfiguration – unused pages, default accounts are normally used to do these types of frauds
7. Insecure cryptographic storage: The attackers will find keys, gets clearest copies of data or find channels that automatically decrypt.
8. Failure to restrict URL address: If there is a hole in the security, it is easy for an attacker to modify an url to access a privileged page without authroisation.
9. Insufficient transport layer protection: A bad SSL set up helps MITM or phishing attacks.
10. Unvalidated redirects and forwards
Question no.2
Reflect on your experience applying the Divergent-Convergent Thinking method. What types of answers does DCT produce? What types of answers does DCT NOT produce? Discuss your experience applying the method. Do you believe the results? Do you trust the results? Why or why not?
First let us understand about the concept of Divergent convergent thinking method. Convergent thinking is concentrating on one method of concrete solution to a problem. So it focuses on the crux of the problem and try to solve it by removing the barriers and arriving at a solution in a unique fixed method.
But divergent thinking is completely different from this. As name itself implies divergence is exploring multiple solutions, possible for a single problem with ideas creatively generated with all possibilities. Thus divergence is not only thinking about the problem but external factors which cause the problem, trying to minimize the factors with a creative approach.
In our life, suppose I want to pursue a civil engineering course, say, my problem is I have to equip myself with amount necessary for this education and improve my knowledge and scores in Mathematics, and Science subjects. Thus saving money and improving scores is the method of solving the problem with convergent thinking. But divergent thinking explores whether civil engineering course is really worth trying, whether future scope is there for income, whether the exposures outside would suit me to work there, etc. Thus exploring other relevant factors in a broad perspective and trying to come with creative ideas to modify the real problem and outcomes.
Question No.3
Suppose each risk identified in Part 1 is mutually exclusive with respect to each other. These risks represent causes of harm (i.e., events). How many causes of harm are on the mutually exclusive, collectively exhaustive list of possible causes considered here?
Coming to risks identified with attack on computers, we find that the risks that are mutually exclusive are
i) Attacks from untrusted sites
ii) Attacks from internal users other than yourself
iii) Attacks from unknown persons posing to be service persons of computers
iv) Attacks due to moisture, drought thus affecting the software programme, etc.
v) Attacks due to...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here