Project #30423 - Advanced Information Assurance

 

Bowie State University

Department of Management Information Systems

INSS 779 – Advanced Information Assurance

Spring 2014 – Final    May 12, 2014

Exam Time – 1 hour and 45 minutes

 

First Name:                                                          Last Name:                                         .

Instructions: Attempt all questions. Read the questions carefully and provide your answers in the context of the course as detailed as possible. Avoid too generic answers when the questions ask for specific answers.  Avoid plagiarism and copying from others work.

 

  1. Using Figure 1: Campus Network infrastructure, answer the following questions (Each has 10 points):

 

                                i.            Identify five information resources that need to be protected from security threats in the diagram presented in Figure 1.

 

                              ii.            Identify security control mechanism placed to protect the information resources that need to be protected from security threats in the diagram presented in Figure 1.

 

                            iii.            Indentify two locations in Figure 1 where IDPS should be deployed to strengthen the security posture of the university. Explain why?

 

                            iv.            List and briefly explain how the two competitive advanced and recent security solutions/products can strengthen the security posture of the university in Figure 1.

 

 

 

  1. Pick two topics out of the different topics listed:  access control, network attacks (wired and wireless), certification and accreditation (C&A), vulnerabilities and threats, secured software development, PKI, stenography, application environment and security controls.

 

As a consultant answer the following questions:

    1. Provide a maximum of three paragraphs of summary of knowledge and skills you acquired on each of these two topics, i.e., three paragraphs per topic. (20 points)
    2. Explain how do knowledge and skills related to each of these two topics to enhance the security posture of a university with network diagram presented in Figure 1.  (20 points)


Figure 1: Campus Network infrastructure (available  also at http://www.polyu.edu.hk/its/student_handbook/pdf/app_e.pdf )

 

 

 

 

 

  1. What are the differences between ensuring security in the software that you build and in software that you buy?  What are the different standards (also called common criteria) available for checking security of commercial off-the-shelf (COTS) software? List at least two. (20 points).

 

 

Subject Computer
Due By (Pacific Time) 05/08/2014 05:00 pm
Report DMCA
TutorRating
pallavi

Chat Now!

out of 1971 reviews
More..
amosmm

Chat Now!

out of 766 reviews
More..
PhyzKyd

Chat Now!

out of 1164 reviews
More..
rajdeep77

Chat Now!

out of 721 reviews
More..
sctys

Chat Now!

out of 1600 reviews
More..
sharadgreen

Chat Now!

out of 770 reviews
More..
topnotcher

Chat Now!

out of 766 reviews
More..
XXXIAO

Chat Now!

out of 680 reviews
More..
All Rights Reserved. Copyright by AceMyHW.com - Copyright Policy