Question

Cyber Security Question: A University is considering placing a smart television in each dorm room. One...

Cyber Security Question:

A University is considering placing a smart television in each dorm room. One exciting feature for this new television is that it uses voice control, with no control buttons on the television (other than an on/off button to turn the screen on and off). There is no remote control (so that you cannot lose it). The smart television is also connected to the campus Ethernet network. The television computer is always “on” to listen to the voices in the room in case any of the voice is a command to the television.

You are asked to do a risk assessment for this system.

(a) Identify 3 assets in this environment. Describe the function or capability of each. [Expect ¼ page of discussion.]

(b) What are the confidentiality, integrity, and/or availability issues in this environment (use any combination of the three)? Discuss three issues. [Expect ¼ page of discussion.]

(c) If we use a wireless network instead of a wired network, would there be any additional concerns? Discuss three concerns. [Expect ¼ page of discussion.]

(d) What would be the possible “damages” if the three assets identified in (a) are attacked by hackers? Discuss three damages. [Expect ¼ page of discussion.]

(e) To minimize the damages to these assets, discuss the application of one management control, one operational control, and two technical controls. [Expect ½ page of discussion.]

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answers:

(a) Identify 3 assets in this environment. Describe the function or capability of each.

Answer: A Smart Television is use in a wide range of protocol to identify and retrive any type of information over the voice control command from the enviorment. The addtional feature is gained of network capabilities from outside the enviorment. Smart Television uses new type protcol(VOIP-Voice Over Internet Protocol) that will useful for the retrival of the data and scanning of any new person or object by using Voice node.Smart Television include

1.Domain Name System

2.Hardware

3.Software

4.IP adresses

5.Model

Assets found in enviorment are

A) VOIP(Voice Over Internet Prortcol): VOIP is also called as the IP-Phone.VOIP uses voice over IP Technology for the tranmission of call VOIP is the combination of the software and hardware that enables the consumer for tranmission of calling through internet(Ethernet Network). the tramsmission call through network is possible due to passing of the Data Packets from Source to the Destination

B)FireWall: Firewall is for Monitoring and Controlling the incoming and the outgoing network trafic

it keep safe from third party.it allows only the authorized user.it provide protection from the cyber crime.

it allows transmission data packets without any disturbance and safe.

C)Switch: Switch Commonly known as Hubs or MAC bridage or bridding hub.

Switch is a networking device that connect your device in your network. hubs on computer that coonect to other device useful in the Reciving and Forwarding of the data by using the Packet Switching

Answer:

(b) What are the confidentiality, integrity, and/or availability issues in this environment (use any combination of the three)? Discuss three issues

Answer: Likehood the combination of the confidentiality, integrity, and/or availabilityissues in enviorment are the

A)INTERNET ACESS: This is correspond to the replacement of the Internet Channel used by the Smart Television in order to the aceesses interactive services to the internet

Threat sources are the malicious person nearby home,virus.

Threats: data altered, medium replaced

B) TV Broadcast :This threat similar to a malicious replacement of the TV broadcast channel used by the TV in order to receive the contents of TV channels.

Threat sources: malicious person nearby home. –

Threats: data altered

the combination of the confidentiality, integrity, and/or availabilityissues in enviorment for Supporting assets are

Local acesses

Local Area Acesses

Television broadcast

Television Operator

VOD Provider

(c) If we use a wireless network instead of a wired network, would there be any additional concerns? Discuss three concerns

Answer:

1) The additional concern with use of the wireless network is the phsical moviability i.e we can move the Smart Television accordint our convience

2) It handles lagre number of user at a time

3) Insataneous transmission of infrmation to the social network

4) Students can easily aceesible to the wireless network than the wired network

5) Smart television can easily share their data or any information to the student all over the university

6)Wireless cable reduces cost and time expense of adding the cables on the wall

(d) What would be the possible “damages” if the three assets identified in (a) are attacked by hackers? Discuss three damages

Answer: Smart Television is Hacked then following damges produce

1) If cyber attack take place in our smart televsion the first of all hacking of all personal information present in the main memory of smart television

2) Hacking all prevoius search history cache, voice recognization files.

3)Hackers can control of voice of the Smart television and control the voice accoting to the hacker it may produce the discrimination

4)Collection of all data related to work and it stil for money and further miss use of data for doing the fruads

5) Damage of the Data Packets

(e) To minimize the damages to these assets, discuss the application of one management control, one operational control, and two technical controls.

Answer:

  1)Smart television is expressed and the purpose and scope of the IT system is well documented.

2)Smart television is designed, purchased, programmed, developed, or otherwise constructed.

3) Use og Qualititve as well as Quantitative Techniques.

4) Internal infra structure process technology should be strong.

5) Avoidance of sharing of the information.

6)internal and external , foraml an inforaml communication method should be strong.

7)Policies and procedure should be accurate.

8) Verification and recocillation should be done properly.

9)Adapt to any changes n enviorment .

10)improve with innovative practices and algein with them.

11)disposition of information, hardware, and software. Activities may include moving, archiving, discarding, or destroying information and sanitizing the hardware and software.

Add a comment
Know the answer?
Add Answer to:
Cyber Security Question: A University is considering placing a smart television in each dorm room. One...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • I need help with the case W16165 SOMEBODY STOP THE RADIO STAR: JIAN GHOMESHI AT THE CBC Questions: What negative behavior is attributed to Ghomeshi? What was the impact of his alleged behavior on Q em...

    I need help with the case W16165 SOMEBODY STOP THE RADIO STAR: JIAN GHOMESHI AT THE CBC Questions: What negative behavior is attributed to Ghomeshi? What was the impact of his alleged behavior on Q employees? Why did the employee get together to compile the red sky presentation for Groen and Noorani? What else could they have done. If is is true that Goneshi treated Q staff extremely poorly over a long period of time (e.g. from April 2007 to...

  • I need help with the case W16165 SOMEBODY STOP THE RADIO STAR: JIAN GHOMESHI AT THE...

    I need help with the case W16165 SOMEBODY STOP THE RADIO STAR: JIAN GHOMESHI AT THE CBC Questions: What negative behavior is attributed to Ghomeshi? What was the impact of his alleged behavior on Q employees? Why did the employee get together to compile the red sky presentation for Groen and Noorani? What else could they have done. If is is true that Goneshi treated Q staff extremely poorly over a long period of time (e.g. from April 2007 to...

  • Case: Enron: Questionable Accounting Leads to CollapseIntroductionOnce upon a time, there was a gleaming...

    Case: Enron: Questionable Accounting Leads to CollapseIntroductionOnce upon a time, there was a gleaming office tower in Houston, Texas. In front of that gleaming tower was a giant “E,” slowly revolving, flashing in the hot Texas sun. But in 2001, the Enron Corporation, which once ranked among the top Fortune 500 companies, would collapse under a mountain of debt that had been concealed through a complex scheme of off-balance-sheet partnerships. Forced to declare bankruptcy, the energy firm laid off 4,000...

  • Please read the article and answer about questions. You and the Law Business and law are...

    Please read the article and answer about questions. You and the Law Business and law are inseparable. For B-Money, the two predictably merged when he was negotiat- ing a deal for his tracks. At other times, the merger is unpredictable, like when your business faces an unexpected auto accident, product recall, or government regulation change. In either type of situation, when business owners know the law, they can better protect themselves and sometimes even avoid the problems completely. This chapter...

  • CASE 20 Enron: Not Accounting for the Future* INTRODUCTION Once upon a time, there was a...

    CASE 20 Enron: Not Accounting for the Future* INTRODUCTION Once upon a time, there was a gleaming office tower in Houston, Texas. In front of that gleaming tower was a giant "E" slowly revolving, flashing in the hot Texas sun. But in 2001, the Enron Corporation, which once ranked among the top Fortune 500 companies, would collapse under a mountain of debt that had been concealed through a complex scheme of off-balance-sheet partnerships. Forced to declare bankruptcy, the energy firm...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT