Saturday, February 29, 2020

Attack Tree Of Computer Security

Attack Tree Of Computer Security This report is introduces about the possible attack for company and it represent by the attack tree diagram. In the company have six computer and internal server. Each computer is using Microsoft window 7. They are using the DVD to store the backup and the router is default setting. Each employee has the email address. Firstly, I will attack the workstation, try to obtain the password illegally and attack the security such as install virus, Trojan, worm and DOS attack. After that, I will attack the dvd to get the dvd and do some malicious action. Obtain the DVD can through the employee, such as bribe or threaten. Malicious action will install the threats into the DVD and spread to other computer when they are using the backup. Then, we will attack the router which is change the WEP or filter the mac address to cause the computer cannot connect to the network. We also can using threats through the router to install into the system, e.g plashing, pharming, DNS cache poisoning and spoo fing. However, I will attack the server using the internal threats and external threats, such as ask a person to disguise a customer to get the information from company, or ask the temporarily customer to be a spy to do some malicious action. Moreover, attack the email using the security threats like phishing, email spam, virus and spam. Then, obtain the email password from the target. Finally, attack the window 7 using hacking tools to destroy the host file from the system and using physical attack to the system and obtain the important data or change the data to make a big lose for the company. All of these attacks will discuss in this report. Introduction and scope Attack tree helps one to understand security issue better, from the stand point of an attacker. Attack trees are a graphical and mathematical construct used to identify most of the attack that will cause the greatest risk to the defender, determine effective strategies decrease the risk in a acceptable level for the de fender, describe the potential attack between the adversary and the defender, provide a communication mechanism for security analysts, capture what is known and believed about the system and its adversaries, and store the information in a diagram that can be understood for the subsequently defenders. Although it is very hard to identify the entire possible factor that leads to intuition, it is based on the experiences and the ability to extrapolate how the experiences apply on the new situation.  For example, the effectiveness of internet security, network security, banking system security, installation and personnel security may all be modelled using attack trees. The ideal of attack tree is that an equipment, software, process could have vulnerabilities that when successful, they could compromise the entire system. Scope There are six computers and one internal server and each computer encompasses Microsoft Window 7 and Microsoft Office 2007. Each workstation has been patched wi th all updates of March 25, 2010. They are using ADSL 2+ connection. The server and workstation backup is store in a DVD. All the employees have email addresses and there share the document through a D-Link DNS-323 NAS. The router is utilising default settings and consists of a D-Link DSL G604t. Each workstation is utilising Microsoft Windows Malicious Software Removal Tool.

Thursday, February 13, 2020

Week 2 Academic Paper Assignment Example | Topics and Well Written Essays - 250 words

Week 2 Academic Paper - Assignment Example It is important to clarify that this paper adds immense value to the operations of the research body of knowledge and to the cyber security community. This is by enlightening them on a number of common threats and how they can be mitigated. It also provides a well-defined auditing approach, which focuses on sorting of audit records based on legitimate and Clandestine users. Lastly but certainly not the least, it goes ahead to outlining a quality structure of a computer security surveillance system, which is very important in enhancing data security in a cyber-network (Anderson, 1980). Regardless of the benefits, there is a considerable number of weaknesses on this paper and they include lack of clear explanation on how data encryption will be implemented in the integration of surveillance subsystems. It also has a weakness particularly on monitoring vulnerability in a computer network connection (Westby, 2004). Instead, it only outlines computer security monitoring on the individual computer users and

Saturday, February 1, 2020

Explain the different roles played by (i) the central bank, (ii) Essay

Explain the different roles played by (i) the central bank, (ii) depository institutions, and (iii) depositors in the determina - Essay Example For example, there is a strong proof that when money increases rapidly in an economy, there develops a direct relation between money-supply and long-term price inflation. On the other hand, a decrease in the level of money supply in a country leads to a decrease in economic activity, tightened spending levels and a fall in consumer demand. The quantity theory of money states that money supply has a relationship that is directly proportional in nature to the price level (Friedman, 1956). Different institutions have different but correlated roles to play in the determination of money supply in a country and the global economy. Examples of such institutions are the central bank and depository institutions. Depositors also have a part to play in this. Roles of the central bank Every country has a central bank that monitors and determines money supply in the country’s economy. In the US, the money supply is determined by the US Federal Reserve, the central banking system of the US. Its role is to foster economic growth in the US by regulating the actions of private banks and stabilizing the money supply. The Federal Reserve, also known as Fed, uses the expansive monetary policy as a guide in expanding the US money supply (Shin, 2009). Using the expansive monetary policy, the Federal Reserve channels more reserves to the banking system so as to allow private banks more liquidity and to make sure that they have the required ability to issue loans. In the UK, determination of money supply is the function of the Bank of England while that of the counties under the EU is the European Central Bank (ECB) (Burda and Wyplosz, 1997). In order to stabilize an economy in a country, the central bank has the power to determine the level of money stock through the operation of different monetary policies. These policies include reserve requirements, open market operations and discount rates. The most dominant among the three monetary policies is the open market operations p olicy. According to Howells and Bain (2009), an open market operation is a situation in which the central bank purchases or trades government securities for cash in an effort to contract or expand the total money supply. Money supply in the country will increase if the central bank purchases government securities but it will contract if the central bank sells government securities. The responsibility of the central bank in relation to fractional reserve banking is to hold a particular fraction of all deposits. This can be in account with the central bank or in cash. In order to alter money supply, the central bank alters the percentage of total deposits that needs to be held by commercial banks. In this way, the central bank can increase the monetary base in a country by reducing the reserve requirements or reduce the monetary base by increasing the reserve requirements (Mishkin, 1998). The central banks also determine money supply in a country by controlling discount rates. This is possible because the central bank in every country supplies commercial banks with the money they require to meet consumer demand. Therefore, the central bank can meet and control consumer demand for money by controlling the national interest rates. For example, the consumer demand for money will increase greatly if the interest rates decrease while a decrease in consumer demand for money will arise if the interest rates increase. Roles of depository institutions By definition, depository