Question

Security technologies, as well as security architecture and design. Combine the concepts and explain how design...

Security technologies, as well as security architecture and design. Combine the concepts and explain how design choice may affect technology solution selection in the fight against threats and vulnerabilities found in the network. Make sure to cite and reference the sources used for this discussion.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer)

Network and PC vulnerabilities in regards to the user and business for OSs and software using some application are always there. Tremendous increase in online activity of user has made attackers make use of these vulnerabilities to compromise user security and resolve to stealing and leaking data and information and doing malicious activities in the network. There are many different types of threats and vulnerabilities found in the network in different parts of the application such as: SQL injection, buffer overflows, path disclosure etc in the systems. Thus we can well understand that a reason about these threats and vulnerabilities are that there are design issues and design faults in the systems, the type of technology uses and the design choice. As in SQL, one common type of attack is SQL injection, which is by providing malicious code in the user input you can gain access to the authorized content being an unauthorized user. Thus, like SQL injection we have many other problems in OSs and applications which can lead to threats and vulnerabilities. The reason being the companies of the OS and applications are releasing OS patches and updates to resolve those issues and solve them.

Add a comment
Know the answer?
Add Answer to:
Security technologies, as well as security architecture and design. Combine the concepts and explain how design...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Task 3: Analysis of Case Study on Regulating Information Security for the Company: TransManuCo has asked for your help in dealing with securing their information while they remain within set regulatio...

    Task 3: Analysis of Case Study on Regulating Information Security for the Company: TransManuCo has asked for your help in dealing with securing their information while they remain within set regulations. In order to do business efficiently and effectively the company uses eSign. However, they have concerns about the security of this especially with clients overseas. According to the new Protecting Cyber Networks Act Sec. 103 “Permits private entities to monitor or operate defensive measures to prevent or mitigate cybersecurity...

  • Network Security Class Questions Which statement best describe the term “Network Enumeration”? (...

    Network Security Class Questions Which statement best describe the term “Network Enumeration”? (NOT SURE) Network Enumeration means by hackers scout target leverage techniques over the phone to make the target reveal critical information such as SSN, credit information Network Enumeration means “case the joint” this is another form of intelligence gathering Enumeration identifies and poorly protected resource shares are exploited to gain access Network Enumeration describe the motivation of a hacker and the level of ingenuity of the hackers All...

  • For this discussion you will review "Living well with HIV/AIDS - A manual on nutritional care...

    For this discussion you will review "Living well with HIV/AIDS - A manual on nutritional care and support for people living with HIV/AIDS" http://www.fao.org/docrep/005/y4168e/y4168e00.HTM Then respond to the following: 1. What are three diet therapy considerations that must be made for people living with HIV/AIDS? 2. Why is it important for them to adhere to these dietary requirements? 3. What may happen if they don't? 4. What two strategies can you use to facilitate adherence? Please make an initial post...

  • Please send an easy to read circuit design as well and explain how it works. 4:02...

    Please send an easy to read circuit design as well and explain how it works. 4:02 00 LTE il 50% + ENEE 2586 - Lab 9_f... @ + : ENEF 356 Lab -Sequence Detector ENEE 2586 Lab #9 - Sequence Detector Purpose: The goal of this lab is to design a sequence detector using sequential logic circuits Procedure: 1. Design a sequential logic circuit to check an input stream labeled X and to produce an output Z=1 for any input...

  • Subject: Principles of Information Security True/False Traffic that is encrypted will typically pass by an intrusion...

    Subject: Principles of Information Security True/False Traffic that is encrypted will typically pass by an intrusion prevention system untouched. Performing cloud-based data loss prevention (DLP) is as simple as moving the enterprise edge methodology to the cloud. General UNIX baselining follows similar concepts as baselining for Windows OSs. Defense against attack begins by eliminating threats. A worm is malicious code that has to attach itself to something else to survive. With the availability of DNS blacklisting, pattern matching is no...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for...

    TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...

  • Read the article bellow an answer the question at the bottom. Broadcom Completes Acquisition of Symantec...

    Read the article bellow an answer the question at the bottom. Broadcom Completes Acquisition of Symantec Enterprise Security Business November 4, 2019 SAN JOSE, Calif., Nov. 4, 2019 /PRNewswire/ -- Broadcom Inc. (NASDAQ: AVGO), a global technology leader that designs, develops and supplies semiconductor and infrastructure software solutions, today announced that it has completed its acquisition of the Enterprise Security business of Symantec Corporation (NASDAQ: SYMC). Symantec's Enterprise Security business will now operate as the Symantec Enterprise division of Broadcom...

  • Need help identifying two organizational behaviors concepts/theories that apply to the organizational issue and the characters...

    Need help identifying two organizational behaviors concepts/theories that apply to the organizational issue and the characters in this chapter. We were unable to transcribe this image124 • The Ropes to Skip and the Ropes to Know give someone the benefit of the doubt, our individual ratings tend to be a bit hich When we found 20 percent of our people rated 'superior,' 50 percent 'above average 25 percent 'average,' and only 5 percent below average,' we knew something had to...

  • CASE STUDY U.S. Office of Personnel Management Data Breach: No Routine Hack The U.S. Office of...

    CASE STUDY U.S. Office of Personnel Management Data Breach: No Routine Hack The U.S. Office of Personnel Management (OPM) is conducted, may have been extracted. Government offi responsible for recruiting and retaining a world-class cials say that the exposure of security clearance irn workforce to serve the American people and is also mation could pose a problem for years responsible for background investigations on pro- spective employees and security clearances. In June the OPM system, and its records were protected...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT